Open Access Open Access  Restricted Access Subscription Access

Survey on Identifying Packet Misbehavior in Network Virtualization


Affiliations
1 Karpagam University, Coimbatore - 641021, Tamil Nadu, India
2 Department of Information Technology, Karpagam University, Coimbatore - 641021, Tamil Nadu, India
 

Background/Objectives: The pros in using network virtualization for the users and the resources offers effectual, meticulous, and protected sharing of the networking resources. Methods/Statistical Analysis: In network there is a problem of accountability that any malicious router can drop packets that are supposed to impart packets instead of throwouts. To understand the packet dropping issues in detail this paper recognizes the foremost attacks and to tackle these attacks algorithms are initiated. Findings: A concise assessment on two major attacks are dealt in this article: black hole attack and gray hole attack. If there is any malevolent node in the network, the number of data packets is not reaching the destination, since the packets dive in middle path. To overcome these issues, we identify proposed mechanisms against the attacks and improve the network recital in terms of package globule degree. Applications/Improvements: Heuristics algorithm and obfuscation algorithm are the algorithms which help in exploring lost packets in network while transmitting to end users.

Keywords

Black Hole Attack, Gray Hole Attack, Heuristics Algorithm, Network Virtualization, Obfuscation Algorithm, Virtual Routing and Forwarding.
User

Abstract Views: 156

PDF Views: 0




  • Survey on Identifying Packet Misbehavior in Network Virtualization

Abstract Views: 156  |  PDF Views: 0

Authors

S. Reshmi
Karpagam University, Coimbatore - 641021, Tamil Nadu, India
M. Anand Kumar
Department of Information Technology, Karpagam University, Coimbatore - 641021, Tamil Nadu, India

Abstract


Background/Objectives: The pros in using network virtualization for the users and the resources offers effectual, meticulous, and protected sharing of the networking resources. Methods/Statistical Analysis: In network there is a problem of accountability that any malicious router can drop packets that are supposed to impart packets instead of throwouts. To understand the packet dropping issues in detail this paper recognizes the foremost attacks and to tackle these attacks algorithms are initiated. Findings: A concise assessment on two major attacks are dealt in this article: black hole attack and gray hole attack. If there is any malevolent node in the network, the number of data packets is not reaching the destination, since the packets dive in middle path. To overcome these issues, we identify proposed mechanisms against the attacks and improve the network recital in terms of package globule degree. Applications/Improvements: Heuristics algorithm and obfuscation algorithm are the algorithms which help in exploring lost packets in network while transmitting to end users.

Keywords


Black Hole Attack, Gray Hole Attack, Heuristics Algorithm, Network Virtualization, Obfuscation Algorithm, Virtual Routing and Forwarding.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i31%2F131194