Prevention of Worm at Router Level for Providing Seamless Communication in Network Environment

نویسندگان

  • M. Milton Joe
  • R. S. Shaji
  • K. Ashok Kumar
چکیده

Worm is the major hurdle, which restricts the comfortable communication in any networks. Worm is a malicious software program that destroys the normal communication in the networking systems. Every system must not be vulnerable to avoid infection by worm in the computing networks. Defending against such worm still plays vital role to the network programmers. Various countermeasures have been taken so far, still they all fail to establish a fair communication in the networks, for worm has the automatic propagation nature to propagate from one host to the other host. Previous countermeasures provide worm detection at the host level only, which takes more time in worm detection. This paper suggests an alternative approach to detect the worm at the earlier stage, which means detecting the worm at the router level and forwarding wormless packets to the hosts that are connected in the networks. We have studied the comprehensive characteristics of worm and its propagating nature. We define a novel mechanism to detect the worm that propagates in an automatic fashion among the systems in the networks at the router itself and forward the clean and wormless packets. Our mechanism leads to several metrics, which proves our methodology works better than previous countermeasures. Our results show how our mechanism works and how all the metrics are obtained, when worm is being detected at the router itself. Thus, the proposed worm detection scheme obviously leads to the secure communication in the networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of a Low-Latency Router Based on Virtual Output Queuing and Bypass Channels for Wireless Network-on-Chip

Wireless network-on-chip (WiNoC) is considered as a novel approach for designing future multi-core systems. In WiNoCs, wireless routers (WRs) utilize high-bandwidth wireless links to reduce the transmission delay between the long distance nodes. When the network traffic loads increase, a large number of packets will be sent into the wired and wireless links and can...

متن کامل

Can a Network be Protected from Single-Packet Warhol Worms?

Can a network be protected from single-packet Warhol worms [14]? This paper generates and simulates random network environments to answer that question. The research assumes a perfect detection algorithm and varies the time required to perform the identification. Perfect detection alone is not sufficient; it must also be swift in recognizing threats as some cases presented here show that perfec...

متن کامل

A Modified Aodv Protocol to Detect and Prevent The Wormhole: A Hybrid Approach

In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm h...

متن کامل

PP-MESS-SIM: A Flexible and Extensible Simulator for Evaluating Multicomputer Networks

This paper presents pp-mess-sim, an object-oriented discrete-event simulation environment for evaluating interconnection networks in message-passing systems. The simulator provides a toolbox of various network topologies, communication workloads, routing-switching algorithms, and router models. By carefully defining the boundaries between these modules, pp-mess-sim creates a flexible and extens...

متن کامل

WPAODV: Wormhole Detection and Prevention Technique

--------------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------------In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open entrusted environment with little security a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013