Reshmi S, Dr. M. Anand Kumar


This paper examines and reviews the Obfuscation and Heuristics algorithm in Network Virtualization to protect the packets against unwanted modifications. These two algorithms are mainly focused to eliminate two major attacks say black hole attack and gray hole attack in the network virtualization. These attacks stop the packets in the focal point to reach the destination, which will not intimate the source about the arrival of content in the destination. The Obfuscation and Heuristics Algorithms helps in investigating mislaid packets in network while transmitting to end users. Obfuscation algorithm makes code harder to analyze which added to protect against malicious modifications of a program. Heuristic algorithm is a technique designed for faster recovery. Based on the speed of packet transfer from source to destination this is achieved to eliminate those attacks.


network virtualization; black hole attack; heuristics algorithm; obfuscation algorithm; gray hole attack; packet recovery; packet acknowledge.

Full Text:



Kurose, J. F. & Ross, K. W. (2010). Computer Networking: A Top-Down Approach. New York: Addison-Wesley. P 30.

Radhika Saini, Manju Khari, “Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network”, International Journal of Computer Applications, 2011 April, 20(4), Doi no: 10.5120/2422-3251.

Reshmi. S, M. Anand Kumar, “Secured Structural Design for Software Defined Data Center Networks”, International Journal of Computer Science and Mobile Computing, IJCSMC & ISSN 2320–088X, IMPACT FACTOR: 5.258, Vol.5 Issue.6, June- 2016, pg. 532-537.

M. Anand Kumar, Dr. S. Karthikeyan (2011), “Security Model for TCP/IP Protocol Suite”, Journal of Advances in Information Technology, 2[2], 87-91.

M. Anand Kumar and Dr. S. Karthikeyan (2012),” Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms” International Journal of Computer Network and Information Security”, 4[2]: 22-28.

M. Anand Kumar and Dr. S. Karthikeyan 2012),” A New 512 Bit Cipher - SF Block Cipher” International. Journal of Computer Network and Information Security”, 4[11]:55-61.

Dr. M. Anand Kumar.and Dr. S. Karthikeyan (2013),” An Enhanced Security for TCP/IP Protocol Suite” International. Journal of Computer Science and Mobile Computing, 2[11]:331-338.

Manar Jammala, Taranpreet Singh, Abdallah Shami, RasoolAsal, Yiming Li, “Software-Defined Networking: State of the Art and Research Challenges”, Elsevier’s Journal of Computer Networks, October 2014, 72(1), Doi no: 10.1016/j.comnet.2014.07.004.

Munoz-Arcentales Jose, Zambrano-Vite Sara, Marin-Garcia Ignacio, “Virtual Desktop Deployment in Middle Education and Community Centers Using Low-Cost Hardware”, International Journal of Information and Education Technology, 2013 December, 3(6), Doi no: 10.7763/IJIET. 2013.V3.355.

Mohamed Ali Kaafar, Laurent Mathy, Thierry Turletti, Walid Dabbous, “Real attacks on virtual networks: Vivaldi out of tune”, In Proceedings of the SIGCOMM workshop on Large Scale Attack Defense LSAD, 2006 September, 1(1), Doi no: 10.1145/1162666.1162672.

A. J. Younge, R. Henschel, J. T. Brown, G. von Laszewski, “Analysis of Virtualization Technologies for High Performance Computing Environments”, Cloud Computing (CLOUD), 2011 IEEE International Conference, 2011 July, 1(1), Doi no: 10.1109/CLOUD.2011.29.

Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto, “Detecting Black hole Attack on AODV based Mobile Ad hoc networks by Dynamic Learning Method”, International Journal of Network Security, 2007 Nov,5(3), Doi no:

N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba, “Network Virtualization: State of the Art and Research Challenges”, Communications Magazine, IEEE, 2009 July, 47(7), Doi no: 10.1109/MCOM.2009.5183468.

Imtithal A. Saeed, Ali Selamat, Ali M. A. Abuagoub, “A Survey on Malware and Malware Detection Systems”, International Journal of Computer Applications, 2013 April, 67(16), Doi no: 10.5120/11480-7108.

Reshmi. S, M. Anand Kumar, “Survey on Identifying Packet Misbehavior in Network Virtualization”, Indian Journal of Science and Technology, INDJST & ISSN (Online): 0974-5645, Vol 9; Issue 31, August 2016, Pg: 1-11.

Rekha Kaushik, Jyoti Singhai, “Detection and Isolation of Reluctant Nodes Using Reputation Based Scheme in an Ad-Hoc Network”, International Journal of Computer Networks & Communications, 2011 March, 3(2), Doi no: 10.5121/ijcnc.2011.3207.

Singh HP, Singh VP, Singh R. Cooperative blackhole/ gray¬hole attack detection and prevention in mobile ad hoc net¬work: A review. International Journal of Computer Appli¬cations. 2013 Feb; 64(3). DOI: 10.5120/10613-5330.

Hongmei Deng, Wei Li, Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magazine, 2002 October, 40(10), Doi no: 10.1109/MCOM.2002.1039859.

Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park, “Black hole attack in mobile ad hoc networks”, Proceedings of the 42nd annual southeast regional conference, ACM, 2004 April, Doi no: 10.1145/986537.986560.

Mojtaba Alizadeh, Wan Haslina Hassan, Mazleena Salleh, Mazdak Zamani, Eghbal Ghazi Zadeh, “Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFID”, Journal of Next Generation Information Technology, 2013 Feb, 4(1), Doi no: 10.4156/jnit.vol4.issue1.9.

DOI: https://doi.org/10.26483/ijarcs.v8i8.4651


  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science