Main Reference PaperTo Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks, IEEE Transactions on Dependable and Secure Computing, May/June 2013.
  • This project proposes a defense mechanism against flooding attacks with the aim of detecting and mitigating the flood in the network. It can be achieved through the claim-carry-and-check technique to probabilistically detect the violation of rate limit in DTN environments.

+ Description
  • This project proposes a defense mechanism against flooding attacks with the aim of detecting and mitigating the flood in the network. It can be achieved through the claim-carry-and-check technique to probabilistically detect the violation of rate limit in DTN environments.

  • To detect the flood Attacks in Disruption Tolerant Networks.

  • To supports low communication cost.

  • To supports data storage in the distributed environment.

+ Aim & Objectives
  • To detect the flood Attacks in Disruption Tolerant Networks.

  • To supports low communication cost.

  • To supports data storage in the distributed environment.

  • Elimination of the attacker in DTN is contributed in which elimination of the node that creates packet flood and replica attack can be done by maintaining a blacklist. The node that violates the rate limits when detected is added in the black list.

+ Contribution
  • Elimination of the attacker in DTN is contributed in which elimination of the node that creates packet flood and replica attack can be done by maintaining a blacklist. The node that violates the rate limits when detected is added in the black list.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.