Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks(2012) Raju, V.K.; Kumar, K.V.Mobile ad hoc networks are vulnerable to many kinds of attacks since they have unique characteristics like limited bandwidth, limited battery power and dynamic network topology. Among the various attacks possible in mobile ad hoc networks wormhole attack is one which is treated as a very severe attack. In this attack a malicious node records packets at one location in the network and tunnels them to another malicious node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack in the routing phase itself. Our mechanism is based on the total round trip time (RTT) of the established route and the average round trip times of the sender one hop neighbors, which is considered as maximum one hop round trip time. Our solution works for both mobile ad hoc networks and wireless ad hoc networks. © 2012 IEEE.Item Split personality malware detection and defeating in popular virtual machines(2012) Kumar, A.V.; Vishnani, K.; Kumar, K.V.Virtual Machines have gained immense popularity amongst the Security Researchers and Malware Analysts due to their pertinent design to analyze malware without risking permanent infection to the actual system carrying out the tests. This is because during analysis, even if a malware infects and destabilizes the guest OS, the analyst can simply load in a fresh image thus avoiding any damage to the actual machine. However, the cat and mouse game between the Black Hat and the White Hat Hackers is a well established fact. Hence, the malware writers have once again raised their stakes by creating a new kind of malware which can detect the presence of virtual machines. Once it detects that it is running on a virtual machine, it either terminates execution immediately or simply hides its malicious intent and continues to execute in a benign manner thus evading its own detection. This category of malware has been termed as Split Personality malware or Analysis Aware malware in the Information Security jargon. This paper aims at defeating the split personality malware in popular virtual machine environment. This work includes first the study of various virtual machine detection techniques and then development of a method to thwart these techniques from successfully detecting the virtual machines-VirtualBox, VirtualPC and VMware. Copyright © 2012 ACM.Item Modified RED algorithm to improve the performance of web traffic(2013) Dadhania, M.K.; Kumar, K.V.Reducing the delay of web traffic has been an important issue in Internet works. However, it is difficult to reduce delay while improving throughput. This is because, in order to reduce delay queue size should be less but to improve throughput queue size should be more. In our modification, web traffic and ECN marked packets are dropped only when high congestion occurs at router. We propose a solution to improve response time as well as the number of packets transmitted of web traffic without affecting throughput of bottleneck link. We applied this solution to RED algorithm and tested the performance and efficiency of modified RED algorithm as compared to the original RED algorithm. © 2013 IEEE.
