A REVIEW ON OBFUSCATION AND HEURISTICS ALGORITHM IN NETWORK VIRTUALIZATION

This paper examines and reviews the Obfuscation and Heuristics algorithm in Network Virtualization to protect the packets against unwanted modifications. These two algorithms are mainly focused to eliminate two major attacks say black hole attack and gray hole attack in the network virtualization. These attacks stop the packets in the focal point to reach the destination, which will not intimate the source about the arrival of content in the destination. The Obfuscation and Heuristics Algorithms helps in investigating mislaid packets in network while transmitting to end users. Obfuscation algorithm makes code harder to analyze which added to protect against malicious modifications of a program. Heuristic algorithm is a technique designed for faster recovery. Based on the speed of packet transfer from source to destination this is achieved to eliminate those attacks.

[1]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[3]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[4]  Dr. S. Karthikeyan,et al.  An Enhanced Security for TCP/IP Protocol Suite , 2013 .

[5]  Mojtaba Alizadeh,et al.  Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .

[6]  Rashmi Singh,et al.  Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review , 2013 .

[7]  Jyoti Singhai,et al.  DETECTION AND ISOLATION OF RELUCTANT NODES USING REPUTATION BASED SCHEME IN AN AD-HOC NETWORK , 2011 .

[8]  M. Anand Kumar,et al.  Security Model for TCP/IP Protocol Suite , 2011 .

[9]  M. Anand Kumar,et al.  Survey on Identifying Packet Misbehavior in Network Virtualization , 2016 .

[10]  Muñoz-Arcentales José,et al.  Virtual Desktop Deployment in Middle Education and Community Centers Using Low-Cost Hardware , 2013 .

[11]  Walid Dabbous,et al.  Real attacks on virtual networks: Vivaldi out of tune , 2006, LSAD '06.

[12]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach , 1999 .

[13]  Manju Khari,et al.  Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network , 2011 .

[14]  Geoffrey C. Fox,et al.  Analysis of Virtualization Technologies for High Performance Computing Environments , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[15]  M. Anand Kumar,et al.  Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms , 2012 .

[16]  Raouf Boutaba,et al.  Network virtualization: state of the art and research challenges , 2009, IEEE Communications Magazine.

[17]  Yiming Li,et al.  Software defined networking: State of the art and research challenges , 2014, Comput. Networks.

[18]  Ali Selamat,et al.  A Survey on Malware and Malware Detection Systems , 2013 .

[19]  B.Manimekala ROUTING SECURITY IN WIRELESS ADHOC NETWORKS , 2019 .