Nowadays network growing rampant manner and uses as transfer medium like data, money transaction, information etc. Even though internet plays a vital role still there is some vulnerability. Ex: virus, spam, hacking, DOS, DDos, etc.We are focusing Distributed Denial of Service; there is plenty of Denial of Service mechanism existed in that we took SYN Flood attacks.With this view my proposed work is, an efficient method to detecting and mitigation against TCP SYN flooding attacks using Three Counters Algorithm, which detects spoofed IP packets up to 80%.
Today wireless communications is acting as a major role in networks. Through year-end 2006, the employee's ability to install unmanaged access points will result is more than 50% of enterprises exposing sensitive information through the wireless virtual private networks (VPN). It enables you to send the data between two computers across a shared or public network in a manner that emulates the properties of a private link. The basic requirements for VPN are User Authentication, Address Management, Data Compression, Data Encryption and Key Management. The private links are established in VPN using Point-to-Point Tunneling Protocol (PPTP) and Layer-Two-Tunneling Protocol (L2TP). These protocols are satisfies VPN requirements in five layers. In user authentication layer, multiple trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process. In fourth layer the data encryption part using RC4 called Microsoft-Point-toPoint Encryption (MPPE) method. The aim of this paper, instead of multiple trusted authorities we focus single trusted authority using public key cryptography RSA in EAP and also we include AESRijndael stream cipher algorithm instead of RC4 for MPPE. We propose new type of hybrid encryption technique using AES-Rijndael for encryption and decryption and RSA used for key management.
The ash-bin may be essential would like everywhere the place. Nowadays numerous models of dustbins like open dustbins, mesh dustbins, pedal dustbins, swing lid dustbins square measure accustomed throw garbage or trash. the matter with open and mesh dustbins is that if the trash is unbroken for several days it's going to result in dangerous odour and child can unfold the trash all around. Another drawback is those that have kids, it's terribly troublesome to watch and to distant them from dustbins. The matter with pedal ash-bin is that it's not economical to be utilized by incapacitated folks. The issues with the prevailing system are often overcome by good ash-bin that is Associate in Nursing improvement of traditional ash-bin by elevating it to be good victimization Arduino board, motor and ultrasonic sensors for garbage detection. Associate in Nursing ultrasonic sensing element detects the rubbish that is unbroken on the subject of it and also the ash-bin opens followed by beep sound by permitting user to throw garbage into it. when the rubbish is thrown, the ash-bin is mechanically closed. These dustbins are often employed in homes, offices, hospitals, streets etc. Here the planned paper presents the economical use of dustbins. the aim of this project is to cut back human manual efforts and to automatize the task of ash-bin at the side of improvement of good home vision and good town vision.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.