Read e-book online Advances in Network Security and Applications: 4th PDF

By Hiran V. Nath (auth.), David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai (eds.)

This ebook constitutes the court cases of the 4th overseas convention on community protection and purposes held in Chennai, India, in July 2011. The sixty three revised complete papers offered have been conscientiously reviewed and chosen from a number of submissions. The papers tackle all technical and sensible points of defense and its purposes for stressed and instant networks and are prepared in topical sections on community safety and purposes, advert hoc, sensor and ubiquitous computing, in addition to peer-to-peer networks and belief management.

Show description

Read or Download Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 PDF

Best security books

Download e-book for kindle: Taiwan's Security and Air Power: Taiwan's Defense against by Martin Edmonds

Fresh crisis approximately mainland China's intentions in the direction of Taiwan, and extra common problem in regards to the threat of instability within the zone, has ended in becoming curiosity in Taiwan's army method. This booklet brings jointly a number of specialists from the West and from Taiwan itself who study the major concerns hooked up with Taiwan's air energy, that is a key element of the China-Taiwan army stability.

T. David Mason, Abdul M. Turay's US-Japan Trade Friction: Its Impact on Security Cooperation PDF

Kin among Japan and the U.S. stay robust, and government-to-government relatives stay effective. despite the fact that, lawsuits will be heard. This quantity displays those sentiments and emphasizes the necessity to advertise nearer ties and larger knowing among the U.S. and Japan.

Additional resources for Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

Example text

1 Single Point The classic paradigm of the introduction of a worm is to use a single point of origin, such as a single Internet system. This host is set up to launch the worm and infect a number of child nodes, carrying the worm with it. These new nodes then begin the next round of target identification and compromise. A well-connected and reasonably poorly monitored host is to be found out. To achieve the maximum introduction from a single point, this node will have to infect several new hosts, which are also capable of a wide area of infection.

It shows that the proposed system has enough alternative routes to the destination even with the presence of colluding packet droppers when compared to OCEAN. 6 Conclusions and Future Work The simulation result shows that the packet loss ratio, malicious drop, false detection and send buffer drop were greatly reduced. It shows the effectiveness of the proposed system in detecting the misbehaving nodes and finding out the alternative routes. The proposed system is immune to colluding packet dropping misbehavior because of the combination of timely generation of an explicit route error packet by the neighboring nodes and the polling process.

These new nodes then begin the next round of target identification and compromise. A well-connected and reasonably poorly monitored host is to be found out. To achieve the maximum introduction from a single point, this node will have to infect several new hosts, which are also capable of a wide area of infection. This will be crucial in establishing the initial presence of the worm when it is most vulnerable, existing on only a few nodes. An obvious weakness in this scenario is that the worm may be identified back to its source and ultimately its author.

Download PDF sample

Rated 4.01 of 5 – based on 8 votes