Main Reference PaperMitigation Model for DDoS Attack in Wireless Sensor Networks, 2015. [NS2]
  • Rate limit based leaky bucket algorithm is proposed to reduce the impact of attack. TTL based filtering of the packets is done to reduce the network traffic.

+ Description
  • Rate limit based leaky bucket algorithm is proposed to reduce the impact of attack. TTL based filtering of the packets is done to reduce the network traffic.

  • To detect and eliminate the attack traffic

  • To improve the performance of data delivery by filtering attacker traffic

+ Aim & Objectives
  • To detect and eliminate the attack traffic

  • To improve the performance of data delivery by filtering attacker traffic

  • A technique is contributed that improves detection accuracy.

+ Contribution
  • A technique is contributed that improves detection accuracy.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.