ISSN ONLINE(2319-8753)PRINT(2347-6710)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Special Issue Article Open Access

Efficient Decentralized Network Control And Attack Analysis Model Using ENICS In Collaborative Protection Networks

Abstract

In wireless network environments, the chances for the vulnerability and the attacks against the data are getting higher at a gradual phase because of the various hacking and intrusion mechanisms. Lot of researches is in progress to protect the data and the associated nodes against these attacks. In comparison, the protection for the data and the nodes are reasonable for the centralized networks in defining specified architectures. But alarmingly, the security measures among the decentralized networks are very less in number and hence the need for efficient decentralized network control and attack analysis model is very high. In our work, we design a novel mechanism called Enhanced Network Intrusion Detection and Countermeasure Selection (ENICS) for detection and prevention of intrusion in the decentralized network. The control centre associated with the upstream intermediate network has three sub divisions, network controller, node profiling and attack analyzer. We analyze and detect the DDOS attacks using the control centre. Programmable network has performance enhancer and counter measure selection. This will ease the prevention control for the decentralized collaborative networks. In the simulation analysis, we measure the performance metrics, viz. CPU Utilization, Network Communication Delay, Success Analysis Rate and Throughput Analysis Rate for ENICS and compare them with the existing works based on NICE and Firecol-DGSOT using the simulation tool NS2. Results show that ENICS has better performance measure while detecting and preventing the intrusion attacks of the decentralized networks

Sakthidevi.I, Joshva Devadas.T

To read the full article Download Full Article | Visit Full Article