Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Border gateway routing protocol convergence time analysis with minimum route advertisement information
    (Springer Verlag, 2010) Vadakkepalisseri, M.V.N.; Chandrashekaran, K.
    The Border Gateway Protocol (BGP) is the default routing protocol for the routing between autonomous systems in the Internet. BGP's convergence time is mainly dependent on the Minimum Route Advertisement Interval (MRAI) value, But the influence of this MRAI value on the router's resources is not yet understood well enough to improve the existing protocol implementation in terms of the specific aspects like CPU utilization, Memory requirement, Bandwidth utilization and convergence time. Therefore it has been analyzed to understand the relationship between the setting of Minimum route advertisement (MRAI) value and the resource requirement of BGP. This paper analyse the convergence times and number of exchanged updates to the different MRAI settings of BGP. In particular, the influence of the MRAI timer in the router CPU utilization, Bandwidth and Memory requirement, number of updates and convergence time is investigated. Designed an algorithm to enhance the convergence time of BGP by considering the minimum route advertisement interval time and reduce routing update overhead. And it shows enhancement of 17% of CPU utilization, 10% of Bandwidth, 10% of memory requirement and 14% of convergence time when compared with the existing system. © 2010 Springer-Verlag Berlin Heidelberg.
  • Item
    Risk based access control in cloud computing
    (Institute of Electrical and Electronics Engineers Inc., 2016) Lakshmi, H.; Namitha, S.; Seemanthin; I Gopalan, S.; Sanjay, H.A.; Chandrashekaran, K.; Bhaskar, A.
    Cloud computing is one of the most trending technologies of today. Most of the resources we use on an everyday basis are stored online as cloud storage. Our files, which have sensitive information, are accessible on valid authentication. When we consider the large scale organizations who host several servers to store their data, we also need to consider the possibility of insider attacks. Data security and integrity is of utmost importance in any organization. Insider attacks mainly focus on exploiting this data. Our model which implements risk based access control takes into consideration several parameters that assess the individual's risk. Access is provided to the user only if his/her risk value is lesser than the threshold risk. Therefore, any possibility of insider threat such as buffer overflow and session hijacking attack is tackled before it occurs. Our model allows a maximum risk of 70% which means that even at the worst case scenario, 30% of the data is still secure. There is a huge potential for future enhancement. © 2015 IEEE.