Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
Search Results
Item Testing resilience of router against denial of service attacks(2011) Karande, V.M.; Narayanan, S.N.; Pais, A.R.; Balakrishnan, N.Provisioning data security and integrity in an IP network requires a detailed understanding of both the architecture and the performance of devices that are used within the network. A router interconnects two or more computer networks, and it becomes most common target for attackers to carry out Denial of Service Attacks. Thus it is necessary to study the effect of resource exhaustion attack on router with respect to its performance and security. In this paper, the proposed framework provides an effective method to evaluate router performance and its resilience against denial of service attacks. The feasibility of the framework has been demonstrated by carrying out different resource exhaustion attacks on device under test (DUT) i.e. router, and the resilience against the attacks is measured using a defined set of performance metrics. © 2011 Springer-Verlag.Item A framework for intrusion tolerance in cloud computing(2011) Karande, V.M.; Pais, A.R.Cloud Computing has been envisioned as the next generation architecture and one of the fastest growing segments of the IT enterprises. No matter how much investment is made in cloud intrusion detection and prevention, cloud infrastructure remains vulnerable to attacks. Intrusion Tolerance in Cloud Computing is a fault tolerant design approach to defend cloud infrastructure against malicious attacks. Thus to ensure dependability we present a framework by mapping available Malicious and Accidental Fault Tolerance for Internet Applications (MAFTIA) intrusion tolerance framework for dependencies such as availability, authenticity, reliability, integrity, maintainability and safety against new Cloud Computing environment. The proposed framework has been validated by integrating Intrusion Tolerance via Threshold Cryptography (ITTC) mechanism in the simulated cloud environment. Performance analysis of the proposed framework is also done. © 2011 Springer-Verlag.
