Survey on Identifying Packet Misbehavior in Network Virtualization

Background/Objectives: The pros in using network virtualization for the users and the resources offers effectual, meticulous, and protected sharing of the networking resources. Methods/Statistical Analysis: In network there is a problem of accountability that any malicious router can drop packets that are supposed to impart packets instead of throwouts. To understand the packet dropping issues in detail this paper recognizes the foremost attacks and to tackle these attacks algorithms are initiated. Findings: A concise assessment on two major attacks are dealt in this article: black hole attack and gray hole attack. If there is any malevolent node in the network, the number of data packets is not reaching the destination, since the packets dive in middle path. To overcome these issues, we identify proposed mechanisms against the attacks and improve the network recital in terms of package globule degree. Applications/Improvements: Heuristics algorithm and obfuscation algorithm are the algorithms which help in exploring lost packets in network while transmitting to end users.

[1]  Ali Selamat,et al.  A Survey on Malware and Malware Detection Systems , 2013 .

[2]  Vijay Laxmi,et al.  Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.

[3]  Abhilasha Sharma,et al.  Detection and Prevention from Black Hole attack in AODV protocol for MANET , 2012 .

[4]  Gerald Paul,et al.  Comparative performance of tabu search and simulated annealing heuristics for the quadratic assignment problem , 2010, Oper. Res. Lett..

[5]  Dina Simunic,et al.  Cooperative Gray Hole Attack Discovery and Elimination using Credit based Technique in MANET , 2014 .

[6]  Ilango Krishnamurthi,et al.  Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..

[7]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[8]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[9]  Manju Khari,et al.  Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network , 2011 .

[10]  Mohit Jain,et al.  The Intelligent Network , 1989, Springer Berlin Heidelberg.

[11]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[12]  Andrew H. Sung,et al.  Static analyzer of vicious executables (SAVE) , 2004, 20th Annual Computer Security Applications Conference.

[13]  Chen Wei,et al.  A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[14]  Gurjot Singh Gaba,et al.  Detection and Analysis of Black Hole Attack using IDS , 2016 .

[15]  Samy S. A. Ghoniemy Performance Analysis of Mobile Ad-Hoc Network Protocols Against Black Hole Attacks , 2013, Int. J. Comput. Vis. Image Process..

[16]  S. M. H. Seyedkashi,et al.  New Simulated Annealing Algorithm for Quadratic Assignment Problem , 2010 .

[17]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[18]  Marjan Kuchaki Rafsanjani,et al.  Black Hole Attacks Detection by Invalid Ip Addresses in Mobile Ad Hoc Networks , 2014 .

[19]  Ei Ei Khin,et al.  Impact of Black Hole Attack on AODV Routing Protocol , 2014 .

[20]  Ali Selamat,et al.  A survey on malware propagation, analysis, and detection , 2013 .

[21]  Muñoz-Arcentales José,et al.  Virtual Desktop Deployment in Middle Education and Community Centers Using Low-Cost Hardware , 2013 .

[22]  P. Komisarczuk,et al.  Identification of Malicious Web Pages with Static Heuristics , 2008, 2008 Australasian Telecommunication Networks and Applications Conference.

[23]  K. Hizbullah,et al.  A Khattak Approach for Detection and Removal of Black and Gray Hole Attacks in Manet , 2016 .

[24]  Jaydip Sen,et al.  A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[25]  Tzi-cker Chiueh,et al.  Efficient and Automatic Instrumentation for Packed Binaries , 2009, ISA.

[26]  Joe H. Chow,et al.  A mechanism for detecting gray hole attacks on synchrophasor data , 2014, 2014 IEEE International Conference on Communications (ICC).

[27]  Walid Dabbous,et al.  Real attacks on virtual networks: Vivaldi out of tune , 2006, LSAD '06.

[28]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[29]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[30]  M-Tech Student,et al.  Prevention and Elimination of Gray Hole Attack in Mobile Ad-Hoc Networks by Enhanced Multipath Approach , 2015 .

[31]  Paolo Toth,et al.  A heuristic algorithm for the symmetric and asymmetric vehicle routing problems with backhauls , 1999, Eur. J. Oper. Res..

[32]  Raouf Boutaba,et al.  Network virtualization: state of the art and research challenges , 2009, IEEE Communications Magazine.

[33]  K Vishnu,et al.  Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks , 2010 .

[34]  K. Thangadurai,et al.  Detection of Black Hole Attack in Mobile Ad-hoc Networks using Ant Colony Optimization – simulation Analysis , 2015 .

[35]  Ani Taggu,et al.  TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[36]  Bohyung Han,et al.  Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[37]  Chundong She,et al.  Intrusion Detection for Black Hole and Gray Hole in MANETs , 2013, KSII Trans. Internet Inf. Syst..

[38]  Yiming Li,et al.  Software defined networking: State of the art and research challenges , 2014, Comput. Networks.

[39]  Mojtaba Alizadeh,et al.  Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .

[40]  Sajal K. Das,et al.  Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.

[41]  Ramjee Prasad,et al.  A Mechanism for Gray Hole Attack Detection in Mobile Ad–hoc Networks , 2012 .

[42]  Rashmi Singh,et al.  Cooperative Blackhole/ Grayhole Attack Detection and Prevention in Mobile Ad hoc Network: A Review , 2013 .

[43]  Jyoti Singhai,et al.  DETECTION AND ISOLATION OF RELUCTANT NODES USING REPUTATION BASED SCHEME IN AN AD-HOC NETWORK , 2011 .

[44]  Subrat Kar,et al.  BAAP: Blackhole attack avoidance protocol for wireless network , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[45]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[46]  D. Simunic,et al.  Technique for Detection of Cooperative Black Hole Attack in Mobile Ad-hoc Networks-Survey , 2014 .

[47]  Geoffrey C. Fox,et al.  Analysis of Virtualization Technologies for High Performance Computing Environments , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[48]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[49]  Sandeep Kumar Arora,et al.  Combined Approach for the Analysis of Black Hole and Worm Hole Attack in MANET , 2016 .

[50]  Tsuhan Chen,et al.  Malicious web content detection by machine learning , 2010, Expert Syst. Appl..

[51]  Chinyao Low,et al.  Heuristic solutions to multi-depot location-routing problems , 2002, Comput. Oper. Res..

[52]  Tanupreet Singh,et al.  A Secured Data Transmission Method using Enhanced Proactive Secret Sharing Scheme to Prevent Blackhole Attack in Manets- A Review , 2015 .