期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2011
卷号:2
期号:4
页码:1549-1554
出版社:TechScience Publications
摘要:Identifying the victimized packets which are dropped in the router and revoking them for further utilization and also to protect from hackers. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. Static user-defined threshold and χ protocol approached this issue but it is fundamentally limiting, based on measured traffic rates and buffer sizes. This approach does not infer dynamically and here always a possibility of losing the packets. The number of congestive packet losses that will create an ambiguity. Once the ambiguity from congestion is removed, subsequent packet losses can be attributed to malevolent actions. Setting this threshold is at the best is an art, and will certainly create unnecessary false positives or mask highly focused attacks. A compromised router is malevolently manipulating its stream of Multiple packets. We have designed and implemented a compromised router detection protocol that will dynamically infer the multiple packet losses, based on measured traffic rates and buffer sizes. This paper is distinguished between a router dropping packets malevolently and a router dropping packets due to congestion. The present work consists Adaptive RED algorithm for finding the default packets in short time. Automatically setting ARED parameters and maintains a predictable average queue size and reduces RED’s parameter sensitivity.