PRINCIPLES AND PRACTICES OF NETWORK SECURITY

Dr. Ihtiram Raza Khan is working as senior academician at Jamia Hamdard, Delhi, He has over 26 years of rich experience and has done PhD in the field of software engineering and neural networks. His research areas are Software engineering, Computer Graphics, Machine and Deep learning, Big data, Analytics, Cyber security and IOT. He has been actively involved in training and placement activities as Head and has offered consultancies to 15+ companies. He has over 20 International and Indian patents and copyrights against his name. He has written over 20 books and 30 book chapters. Has 100+ research papers in SCI/Scopus/Springer and peer reviewed journals. He has so far been involved with 55+ Invited talks and 25+ keynote addresses. He is a famous International speaker.

Dr. Mukta Sandhu is fervent educational professional. She has vast and diverse experience of more than decade in the field of Computer Science and Engineering for teaching theories, mentoring projects both in India and USA. She has served as Associate Professor in Bunker Hill College, Boston (USA) and worked as adjunct faculty in North Eastern University  (USA). She has published numerous research papers in various journals of repute like IEEE Xplore, Springer, Elsevier to name few. She has 4 patent to her name. She is heading the Entrepreneurship cell of the university as well center head for monitoring employability of the university.

Dr. Sanjay Agal is working as Principal at Dr V R Godhania College of Engineering And Technology, Porbandar, Gujrat. He has received his PhD degree in Computer Engineering from Pacific University, Udaipur in 2016. He has published 16 international research paper and have two patent in artificial intelligence. He is a keen observer, planner & implementer with track record of developing operational policies/ norms, systems & controls, motivational schemes & education standards for professionals during the career span. He is a Dedicated and self-motivated leader with proficiency in handling the administrative activities and upholding of the institutes motto.

Dr. Hemant N Patel is an Assistant Professor in Computer Engineering at Sankalchand Patel Engineering College, Sankalchand Patel University, Visnagar, Gujarat. Dr. Hemant N Patel has been more than 13 years teaching and 2 years software development experiences.

Description

In order to provide protection against DoS assaults, the security system interfaces with the AODV routing protocol using techniques based on Route Request (RREQ). It employs not one but two different kinds of techniques. When an inside hostile node launches a DoS attack by flooding the network with RREQs, this strategy may be used to minimise the impacts of the assault in pure AODV routing protocol. In this scenario, the DoS attack is carried out by flooding the network with RREQs. The node in the centre of the network both observes and participates in the conversation that is taking place between the evil node, the sender node, and the recipient node. One of the intermediate nodes on the ideal route, which has a total of four nodes, is comprised of the malicious node and three of its neighbours. This makes up one of the nodes on the ideal path. The malicious node inundates the network with traffic by continuously submitting 10 RREQ queries at each and every second. Due to the fact that its close neighbours are aware of the RREQ_RATELIMIT, each of them will only transmit a maximum of 10 RREQs to it at any one time. Due to the fact that these nodes are only able to receive a maximum of three RREQs from their neighbours in a single second, the neighbours of these nodes are required to transmit a total of seven RREQs. In addition, the RREQs of a total of four must be sent by the neighbours of the nodes in question. Because the resources of the malicious node’s neighbours are totally occupied in processing and forwarding the RREQ’s that originate from it, the path that connects the blue nodes, if it is formed at all, will consist of a greater number of intermediate nodes. This is because the malicious node is the source of the RREQ’s that are being processed and forwarded by its neighbours. This is due to the fact that the RREQs that come from the malicious node have an effect on the nodes that are neighbouring it. As a direct result of this, a denial of service attack is carried out since the legitimate nodes are disconnected from the services offered by other nodes, whose resources are being wasted as a direct result of the flooding. During the phase of the AODV scheme’s operation in which two legitimate nodes are attempting to communicate with one another, a malicious node will bombard the network with RREQs in order to disrupt the process. According to this strategy, there is a maximum number of RREQs that may be obtained from a single neighbour, and that number is capped at that amount. As a consequence of this, the neighbours of the malicious node will only accept and transmit three RREQ packets received from it during a period of one second.

Reviews

There are no reviews yet.

Add a review

Your email address will not be published. Required fields are marked *