Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 31, Pages: 1-11
S. Reshmi1* and M. Anand Kumar2
Background/Objectives: The pros in using network virtualization for the users and the resources offers effectual, meticulous, and protected sharing of the networking resources. Methods/Statistical Analysis: In network there is a problem of accountability that any malicious router can drop packets that are supposed to impart packets instead of throwouts. To understand the packet dropping issues in detail this paper recognizes the foremost attacks and to tackle these attacks algorithms are initiated. Findings: A concise assessment on two major attacks are dealt in this article: black hole attack and gray hole attack. If there is any malevolent node in the network, the number of data packets is not reaching the destination, since the packets dive in middle path. To overcome these issues, we identify proposed mechanisms against the attacks and improve the network recital in terms of package globule degree. Applications/Improvements: Heuristics algorithm and obfuscation algorithm are the algorithms which help in exploring lost packets in network while transmitting to end users.
Keywords: Black Hole Attack, Gray Hole Attack, Heuristics Algorithm, Network Virtualization, Obfuscation Algorithm, Virtual Routing and Forwarding
Subscribe now for latest articles and news.