Establishing the Anonymity to Mitigate Identity Based Attacks

Authors(5) :-Revathi V, Guganesan E, Surya Prasanth M, Tharani M, Uthra P

Identity information of the devices are the significant factor to establish the adversaries in the network. Sybil attacks are executed by capturing the IP address and Mac address of the victim devices. Location and channel based information are extracted to eliminate these attacks from the network. But the cooperative attacks can able to capture the data information by providing the fake channel and location information. The Location Distinction model is fails to identify the Identity based attacks when the victim and malicious devices are present in same location. The proposed hashing based anonymity approach can able to prevent the identity based attacks.

Authors and Affiliations

Revathi V
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Guganesan E
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Surya Prasanth M
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Tharani M
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India
Uthra P
Department of Computer Science and Engineering, Akshaya College of Engineering and Technology, Coimbatore, Tamil Nadu, India

Mac Address, victim devices, identity based attacks, sybil attacks, IDAS, NIDAS, MDM, XML, QoS, BNFA

  1. Anat Bremler-Barr, David Hay, YaronKoral (2010),"CompactDFA: Generic State Machine Compression for Scalable Pattern Matching". IEEE INFOCOM Computer Architecture Lett., vol. 7, pp. 33–36.
  2. ArunaJamdagni, Zhiyuan Tan, Xiangjian He, PriyadarsiNanda ,Ren Ping Liu (October 2012), "RePIDAS: A multitier Real-time Payload-based IDENTITY ATTACKS Detection System",Centre for Innovation in IT Services and Applications (iNEXT), University of Technology, Sydney, Australia. http://dx.doi.org/10.1016/j.comnet.2012.10.002, Vol. 2, Issue 2, pp.25-39
  3. Christopher R. Clark and David E. Schimmel (2003) "Efficient Reconfigurable Logic Circuits for Matching Complex Network IDENTITY ATTACKS Detection Patterns". In Proceedings of International Conference on Field-Programmable Logic and Applications (FPL), Lisbon, Portugal. Vol. 2778, pp 956-959.
  4. Cong Liu and Jie Wu (2011),"Fast Deep Packet Inspection with a Dual Finite Automata", IEEE Transactions on Computers.
  5. Fang Yu, Zhifeng Chen, YanleiDiao, Lakshman T.V and Randy H. Katz (2006) "Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection", San Jose, California, USA, pp 1-10.
  6. Hopcroft J. E.  and Ullman J. D. (1979) "Introduction to Automata Theory". Addison Wesley.
  7. KedarNamjoshi  andGirijaNarlikar (2010) ,"Robust and Fast Pattern Matching for IDENTITY ATTACKS Detection". In Proc. of IEEE, Vol.3, pp 740-748.
  8. Lin Tan and Timothy Sherwood (2005),"A High Throughput String Matching Architecture for IDENTITY ATTACKS Detection and Prevention". In Proc. of ISCA, Vol. 18, pp. 93-102.
  9. Martin Roesch (1999),"Snort: Lightweight IDENTITY ATTACKS Detection for Networks", In   Proceedings of LISA '99: 13th Systems Administration Conference Seattle, Washington, USA, November 7–12. Snort: http://www.Snort.org/.
  10. Masanori Bando, N.SertacArtan, and H.Jonathan Chao (June 2012), "Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection", IEEE/ACM Transactions On Networking, Vol. 20, No. 3, pp. 699 - 714.
  11. Mehmet Altinel and Michael J. Franklin (2000),"Efficient Filtering of XML Documents for Selective Dissemination of Information". In Proc. of VLDB Conference.vol.8, pp.53-64.
  12. MichelaBecchi and Patrick Crowley (2007),"A Hybrid Finite Automaton for Practical Deep Packet Inspection". In Proc. of CONEXT, MO 63130-4899+1-314-935-4306.
  13. Nathan Tuck, Timothy Sherwood, Brad Calder, George Varghese (2004),"Deterministic Memory-Efficient String Matching Algorithms for IDENTITY ATTACKS Detection". In Proc. of IEEE INFOCOM, Vol. 33, pp.333-343.
  14. Rafael Antonello, StenioFernandes, Carlos Kamienski, DjamelSadok and Judith Kelner (November 2012), "Deep packet inspection tools and techniques in commodity platforms: Challenges and trends" , Journal of Network and Computer Applications, Vol. 35, No. 6, pp. 1863-1878.
  15. Randy Smith, Cristian Estan, SomeshJha, Shijin Kong (2008),"Deflating the big bang: fast and scalable deep packet Inspection with extended finite automata" August 17–22, Seattle, Washington, USA.  LNCS 5352, pp. 158–172.
  16. ReetinderSindhu and Viktor K.Prasanna (2001),"Fast Regular Expression Matching Using FPGAs". Contract no.DABT63-99-1-0004, In Proc. of FCCM, Volume 22, pp. 66–74.
  17. Sailesh Kumar, SarangDharmapurikar, Fang Yu, Patrick Crowley, Jonathan Turner (2006),"Algorithms to Accelerate Multiple Regular Expressions Matching for Deep Packet Inspection". In Proc. of ACM SIGCOMM,        pp-339-350.
  18. Salvatore Pontarelli, Giuseppe Bianchi, Simone Teofili(May 2012), "Traffic-aware Design of a High Speed FPGA Network IDENTITY ATTACKS Detection System",   ConsorzioNazionaleInterUniversitario per le Telecomunicazioni (CNIT) University of Rome "Tor Vergata" Via del Politecnico 1, 00133, Rome, ITALY,Vol-pp,Issue-99,pp.-13.
  19. SangKyun Yun, Member, IEEE Computer Society(February 2012), "An Efficient TCAM-Based Implementation of Multipattern Matching Using Covered State Encoding", IEEE Transactions On Computers, Vol. 61, No. 2, pp.213-221.
  20. Shijin Kong, Randy Smith, Cristian Estan (2008),"Efficient Signature Matching With Multiple Alphabet Compression Tables". In Proc. of Secure communication,Vol. 6307,pp.58-78.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 621-633
Manuscript Number : CSEIT1722224
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Revathi V, Guganesan E, Surya Prasanth M, Tharani M, Uthra P, "Establishing the Anonymity to Mitigate Identity Based Attacks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.621-633, March-April-2017.
Journal URL : http://ijsrcseit.com/CSEIT1722224

Article Preview

Follow Us

Contact Us