A REVIEW ON OBFUSCATION AND HEURISTICS ALGORITHM IN NETWORK VIRTUALIZATION
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Kurose, J. F. & Ross, K. W. (2010). Computer Networking: A Top-Down Approach. New York: Addison-Wesley. P 30.
Radhika Saini, Manju Khari, “Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Networkâ€, International Journal of Computer Applications, 2011 April, 20(4), Doi no: 10.5120/2422-3251.
Reshmi. S, M. Anand Kumar, “Secured Structural Design for Software Defined Data Center Networksâ€, International Journal of Computer Science and Mobile Computing, IJCSMC & ISSN 2320–088X, IMPACT FACTOR: 5.258, Vol.5 Issue.6, June- 2016, pg. 532-537.
M. Anand Kumar, Dr. S. Karthikeyan (2011), “Security Model for TCP/IP Protocol Suiteâ€, Journal of Advances in Information Technology, 2[2], 87-91.
M. Anand Kumar and Dr. S. Karthikeyan (2012),†Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms†International Journal of Computer Network and Information Securityâ€, 4[2]: 22-28.
M. Anand Kumar and Dr. S. Karthikeyan 2012),†A New 512 Bit Cipher - SF Block Cipher†International. Journal of Computer Network and Information Securityâ€, 4[11]:55-61.
Dr. M. Anand Kumar.and Dr. S. Karthikeyan (2013),†An Enhanced Security for TCP/IP Protocol Suite†International. Journal of Computer Science and Mobile Computing, 2[11]:331-338.
Manar Jammala, Taranpreet Singh, Abdallah Shami, RasoolAsal, Yiming Li, “Software-Defined Networking: State of the Art and Research Challengesâ€, Elsevier’s Journal of Computer Networks, October 2014, 72(1), Doi no: 10.1016/j.comnet.2014.07.004.
Munoz-Arcentales Jose, Zambrano-Vite Sara, Marin-Garcia Ignacio, “Virtual Desktop Deployment in Middle Education and Community Centers Using Low-Cost Hardwareâ€, International Journal of Information and Education Technology, 2013 December, 3(6), Doi no: 10.7763/IJIET. 2013.V3.355.
Mohamed Ali Kaafar, Laurent Mathy, Thierry Turletti, Walid Dabbous, “Real attacks on virtual networks: Vivaldi out of tuneâ€, In Proceedings of the SIGCOMM workshop on Large Scale Attack Defense LSAD, 2006 September, 1(1), Doi no: 10.1145/1162666.1162672.
A. J. Younge, R. Henschel, J. T. Brown, G. von Laszewski, “Analysis of Virtualization Technologies for High Performance Computing Environmentsâ€, Cloud Computing (CLOUD), 2011 IEEE International Conference, 2011 July, 1(1), Doi no: 10.1109/CLOUD.2011.29.
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto, “Detecting Black hole Attack on AODV based Mobile Ad hoc networks by Dynamic Learning Methodâ€, International Journal of Network Security, 2007 Nov,5(3), Doi no: 10.1.1.183.2047.
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba, “Network Virtualization: State of the Art and Research Challengesâ€, Communications Magazine, IEEE, 2009 July, 47(7), Doi no: 10.1109/MCOM.2009.5183468.
Imtithal A. Saeed, Ali Selamat, Ali M. A. Abuagoub, “A Survey on Malware and Malware Detection Systemsâ€, International Journal of Computer Applications, 2013 April, 67(16), Doi no: 10.5120/11480-7108.
Reshmi. S, M. Anand Kumar, “Survey on Identifying Packet Misbehavior in Network Virtualizationâ€, Indian Journal of Science and Technology, INDJST & ISSN (Online): 0974-5645, Vol 9; Issue 31, August 2016, Pg: 1-11.
Rekha Kaushik, Jyoti Singhai, “Detection and Isolation of Reluctant Nodes Using Reputation Based Scheme in an Ad-Hoc Networkâ€, International Journal of Computer Networks & Communications, 2011 March, 3(2), Doi no: 10.5121/ijcnc.2011.3207.
Singh HP, Singh VP, Singh R. Cooperative blackhole/ gray¬hole attack detection and prevention in mobile ad hoc net¬work: A review. International Journal of Computer Appli¬cations. 2013 Feb; 64(3). DOI: 10.5120/10613-5330.
Hongmei Deng, Wei Li, Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networkâ€, IEEE Communications Magazine, 2002 October, 40(10), Doi no: 10.1109/MCOM.2002.1039859.
Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park, “Black hole attack in mobile ad hoc networksâ€, Proceedings of the 42nd annual southeast regional conference, ACM, 2004 April, Doi no: 10.1145/986537.986560.
Mojtaba Alizadeh, Wan Haslina Hassan, Mazleena Salleh, Mazdak Zamani, Eghbal Ghazi Zadeh, “Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFIDâ€, Journal of Next Generation Information Technology, 2013 Feb, 4(1), Doi no: 10.4156/jnit.vol4.issue1.9.