You are on page 1of 8

ISSN: 2321-5585 (Online)

IJRCSE Vol-5, Issue-6, Nov -Dec, 2015 ISSN: 2321-0338(Print)

Instinctive Quality Container in the Node Group in


Wireless Networks 1
Yedluri Deepika, 2M.Gargi
1
M.Tech Student, 2Assistant Professor,
1,2
Department of Computer Science and Engineering,
1,2
Vignan’s Lara Institute of Technology and Science, Vadlamudi, AP, India.

Abstract: Packets through a mechanism called number of corporations as a powerful means of


ARQ, where each lost packet is retransmitted until efficiently thinks business applications without
it is received. If several clients are connected to the different costs A crucial concern data model
same AP, currently, the only way to achieve reliable services is the protection of the bit stream[4][8]
communication for all clients is by applying this from different peoples use duplication and sharing
mechanism individually for each client using One of the most popular approaches to prevent
multiple uncast flows. By instead exploiting the undesirable contents sharing to insipiently users to
nature of the physical channel, the present thesis protect authors’ copyrights is the digital rights
proposes a more throughput efficient reliability management (DRM)models. Most DRM techniques
mechanism using network coding The results show employ cryptographic or digital watermark model
that network coding does not achieve improvements we mainly on the illegal redistribution of streaming
in a single client scenario with multiple clients, a content by an authorized user to external
proposed reliability mechanism using network network[14][18]s The existing proposals and
coding allows for a 25% reduction of redundant monitor information obtained at different nodes in
packets transmitted This gives significant the middle of the streaming locations The retrieved
improvement in the throughput as compared to data are used to generate traffic patterns which
ARQ. Since the results are based on both appear as single content just like signatures The
experiments and theory, the aspects of commercial generation of traffic pattern no require any
use are discussed, and followed up by giving information on the packet header and therefore
suggestions for future work. preserves the user’s privacy loss data detection is
then performed by comparing the generated traffic
Index Terms: Streaming Content, Leakage
patterns the existence of data of different length in
Detection, Traffic Pattern, Degree of Similarity
the network locations causes a considerable
Fault Detection; PCA, Boilers, Loss Data, XSS,
degradation in the leakage detection results then
ARQ, XOR Scheme.
developing an different loss data detection model
robust to the variation data lengths indeed required
I. Introduction
by balancing different length data[16][19] we
They serve number of population users from the
determine a relationship among the length of data
world with systems contents ranging from daily
to be compared and their behaviorist. Based on this
news feeds to entertainment feeds including
relationship we determine decision threshold
example data music[1][7], videos, sports, and so
different accurate loss detection even in an
forth, by using scams transmission models In
environment with different length data Initially the
addition real-time data streaming connected such
inputs from the user will be take and stored in the
as websites in intra company networks in online
database for the standard for steam the data from
with XSS model differently deployed in a large
www.ijrcse.com International Journal of Research in Computer Science & Engineering 3387
ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov - Dec, 2015 ISSN: 2321-0338 (Print)

the source to the destination The sender sending the content-leakage scenario can be described by the
packets of data of information. Every data from the following steps as depicted a regular user in a
source is sent via packets to reach the destination of secure network receives streaming content from a
the receiver The loss of packets will be checked and content server these with the use of a P-to-P
evaluated based on the sent data’s of packets[10][7] streaming software the regular yet small user
translations then the data is lost during packet different distributes the streaming content to a non
transfer then user there will be an intruder changing regular user outside its network[2]. Such content-
the content in the data packets Information has been loss is hardly detected or blocked by watermarking
loss and changed by the intruder or because of any methods and DRM models An overview of the
different reasons will be checked in the information network models of the proposed leakage detection
leakage check module In information loss check system This model consists of two main
module packets will be checked on the traversal of components namely the traffic pattern generation
source to destination of the indent users engine embedded in each router and the traffic
accordingly The packet Monitoring will be pattern matching engine implemented in the
emphasized with the checking up of the data loss management server then each router can observe its
during the packet transfer from the sender side to traffic volume and generate traffic pattern
the destinations side data exchange Real time Meanwhile the traffic patter matching engine
example of our project is “data streaming of Data computes the similarity between traffic patterns
The overall performance of our system will be through a matching model[9] and based on specific
checked and evaluated in the results evaluation criterion detects contents loss The result is then
module based on the original packet data transfer notified to the target edge router to block leaked
from the user to the receiver of the traffic network traffic[11]
model

II. Existing System


We first take any typical data loss scenario and we
present over all existing traffic pattern-based loss A. Pattern Generation Algorithm:
detection models these popularity of streaming We describe the traffic pattern generation[8][5]
delivery of movies development of P-to-P model performed in observable methods Traffic
streaming[7] software has attracted some models pattern generation model is depended time slot-
These technologies change the distribution of any based algorithm[9] a packet size-based algorithm
type of information in online[3][7] A typical The traffic pattern generated is expressed Time slot-
3388 International Journal of Research in Computer Science & Engineering www.ijrcse.com
ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov -Dec, 2015 ISSN: 2321-0338(Print)

based algorithm is a straight forward solution to


generate traffic patterns by summing the amount of
traffic arrival during a certain period of time In
case some packets are delayed they may be stored
over the delay and jitter of packets distorts the
traffic pattern, and as a consequence, decreases the
accuracy in pattern matching time slot-based
algorithm is affected by packet loss Packet size-
based algorithm defines[9] a slot as the results of
amount of arrival traffic until the observation of a
certain packet size This algorithm only make use of
the packet arrival order and packet size therefore is
robust to change in environment such as delay and Figure no 3 Pattern Matching Algorithms
jitter packet size-based algorithm shows no III. Proposed System
robustness to packet loss. Test packets are sent periodically, and detected
failures trigger a separate mechanism to localize the
fault. ATPG can detect both functional and
performance [3] problems ATPG complements but
goes beyond earlier work in static checking fault
localization which only localize faults given livens
results Network engineers hunt down bugs using the
most rudimentary tools and track down root causes
using a combination of accrued wisdom and
intuition Debugging networks is only becoming
harder as networks are getting bigger and faults into
two categories: action faults and match faults. An
action fault occurs when every packet matching the
Figure no 2 Pattern Algorithm rule is processed incorrectly Examples of action
B. Pattern Matching Algorithm: faults include unexpected[8] packet loss, a missing
In model identify the degree of similarity is defined rule, congestion, and misfiring On the other hand,
to be the similarity measure between patterns The match faults are harder to detect because they only
server-side traffic patterns represents the original affect some packets matching the rules
traffic model and is expressed The user-side traffic
model is expressed as On the other hand the DP
matching algorithm is performed on traffic model
generated through packet size-based algorithm a
fixed predefined value is used as the decision
threshold different patterns are similar is decided
by comparing the distance computed through DP
matching with the decision threshold the distance
less than the threshold indicates that the compared
traffic patterns are similar[8][3].
www.ijrcse.com International Journal of Research in Computer Science & Engineering 3389
ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov - Dec, 2015 ISSN: 2321-0338 (Print)

Automatic Repeat Re Quest (ARQ): Random Linear Network Coding (RLNC):


The way 802.11n ensure reliable communication in RLNC is a type of linear network coding where the
the presence of packet loss is by using a mechanism coefficients for encoding the coded packets are
called ARQ. This mechanism [6] is designed for chosen at random from a Galois field. This has been
only a single sender and receiver, so it is only used shown to allow close to optimal throughput
in uncast streams in WiFi, and not in broadcast [HKM+], yet with less complexity at the sender.
streams. The mechanism works by getting feedback Field theory is not covered in detail in this thesis,
through acknowledgements from the receiver [18] but is explained in great detail in a book called
regarding packets that were correctly received and Finite Fields for Computer Scientists and Engineers
which were not correctly received. The receiver can [McE87]. [16]By choosing the coefficients
verify whether a packet is received successfully by randomly also allows the sender and receiver to
using the Cyclic Redundancy Check (CRC) code generate coded packets with little overhead. Since
provided in the packet. By using the concept of both encoder and decoder must use the same
acknowledging packets, there have emerged [11] a coefficients, it is sufficient for the encoder to
few commonly known versions of ARQ. The most transmit only a seed together with the coded packet,
common are called Stop-and-wait, Go-back-N and and both encoder and decoder can use the seed to
Selective Repeat. WiFi uses the simplest version of generate the same psudo-random coefficients [9]
ARQ called Stop-and-wait, which is explained in
detail in the following section. IV. Proposed Algorithm
Stop-and-wait ARQ: 1. XOR Scheme Model:
This version of ARQ ensures both recovery of lost Input: ordered lists from clients that have elements
packets as well as in-order reception of packets. The marked as either "received" or "lost" from the
Stop-and-wait ARQ mechanism ensures in-order whole block
delivery by forcing each packet in turn to be declare and initialize an empty set of coded packets
received at the receiver, and it provides this reliable declare and initialize a coded packet to 0
communication as follows: for each list, called i
1. Send current packet and start the local timer. | while there still are self-addressed packets marked
2. Wait until you either receive an as "lost" in i
Acknowledgement (ACK), NACK or the local | | for the remaining lists including list i, called j
timer expires. – If ACK received, continue with the | | | find the first element in j that is self-addressed,
next packet, knowing that the packet is received | | | | marked as "lost" in j, marked as "received" in
successfully. – If NACK is received or local timer previous
expires | | | | lists that are part of the coded packet and where
none of
| | | | the packets that are part of the coded packet is
lost in j
| | | if such element is found
| | | | xor it with the coded packet and include index
number from list
| | | | mark that element as "received"
| | if coded packet is not 0

3390 International Journal of Research in Computer Science & Engineering www.ijrcse.com


ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov -Dec, 2015 ISSN: 2321-0338(Print)

| | | add a copy of the coded packet to the set of different Web applications and Web-based data
coded packets and set the coded packet Output: the base systems existing work in the data of Web
set of coded packets application security and mainly useful on the
mitigation of cross site scripting (XSS) and SQL
different attacks. In different cross site request
forgery (XSRF) [16]attacks is received much
attention In an XSRF attack the trust of a Web
application in its authorized users is exploited by
taking the attacker make arbitrary HTTP requests
different user The faults is that Web applications
different act upon such requests indifferent
checking and the performed actions are different
XSRF is a relatively new security faults is largely
different Web application deplored people As a
result these privies[18][21] many Web
applications are vulnerable to XSRF. Indifferently
2. Custom Rate Adaption Algorithm: existing mitigation approaches are time-consuming
The author developed a custom rate adaption and error-prone, as they require manual effort to
algorithm for both drivers. This rate adaption integrate new techniques into privies systems we
algorithm ensures a fixed modulation and coding present use these techniques that provides a
scheme regardless of loss patterns.[21] The completely automatic protection from XSRF
modulation and coding scheme can be manually attacks. Some different peoples our approach is
changed, but it will remain the same until it is based on a server-side web applications finding and
manually changed again. In the rest of this thesis, it prevents XSRF attacks in a way that is transparent
is referred to as the fixed rate adaption algorithm to users as well as to the Web application itself We
define experimental results that taken results we can
use our prototype to secure a number of popular
open-source Web applications different searching
information’s different models[24][12]

3. Preventing Cross Site Request Forgery


Attacks:
The Web applications are taken an different part of
our live [3]. Different times as our dependency on Figure no 4: Preventing Cross Steps Request
the Web notations the interest of attackers use Forgery Attacks
www.ijrcse.com International Journal of Research in Computer Science & Engineering 3391
ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov - Dec, 2015 ISSN: 2321-0338 (Print)

ATPG can also be used to monitor available data of different lengths The proposed method
bandwidth. For this experiment, we used Pathload allows flexible and accurate streaming content
[15], a bandwidth probing tool based on packet leakage detection independent of the length of the
pairs/packet trains. We repeated the previous streaming content which changed secured and
experiment, but decreased the two UDP flows to 10 trusted content delivery rate Artificial Intelligence
Mb/s, so that the bottleneck available bandwidth (AI) is one of the connections oriented research
was 10 Mb/s. Pathload reports that has an available areas which can be utilized to find new ways for
bandwidth5 of 11.715 Mb/s, has an available pattern generation Many technologies such as
bandwidth of 19.935 Mb/s, while the other (idle) Machine Learning and Neural Networks could be
terminals report 30.60 Mb/s. Using the same applied to finding faults new types of web attacks
argument as before, ATPG can conclude that link is We could employ these methods to develop more
the bottleneck link with around 10 Mb/s of available efficiently detection applications based on frame
bandwidth logs with long time taken the results.
V. Future Work
In addition to the web monitor for leakage detection
and analysis of the data streaming indifferent any
the register users to redistribute the data content in
order the trusted networks the watermarking models
along with the video data to embed the security of
the sender and the secret information to the register
users of the trusted network In addition There are
many applications of this research that can be
generated studied and explored. For example,
Artificial Intelligence (AI) is one of the connections
research areas which can be used to find new
models for pattern cassations Many technologies
such as Machine Learning and Neural Networks to
be applied to detect new types of web attacks. We
could user these technologies to develop different
user detection applications based on event logs with
long time observation then our framework further
analyzing inputs and outputs of a web application
Conclusion: system and thus discover and prevent new types of
The content leakage finding system based on the web attacks
real fact that every streaming content has single
References:
traffic pattern is different solution to prevent models
[1] Y. Chu, S.G. Rao, S. Seshan, and H. Zhang,
redistribution of contents by a regular small size of
“Enabling Conferencing Applications on the
user three typical found mental methods namely T-
Internet Using an Overlay Multicast Architecture,”
TRA P-TRAT and DP-TRA This paper attempts to
solve these issues by introducing a XSS models we [2] Z. Yang, H. Ma, and J. Zhang, “A Dynamic
investigate the performance of the proposed method Scalable Service Model for SIP-Based Video
under a real network environment locations with Conference,”
3392 International Journal of Research in Computer Science & Engineering www.ijrcse.com
ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov -Dec, 2015 ISSN: 2321-0338(Print)

[3] Y. Chu, S. G. Rao, S. Seshan and H. Zhang, [14].HTMLParser. http://htmlparser.sourceforge.


“Enabling conferencing applications on the Internet net/, 2006.
using an overlay multicast architecture,”. [15]. Y.-W. Huang, S.-K. Huang, and T.-P. Lin.
[4] K. Su, D. Kundur, and D. Hatzinakos, Web Application Security Assessment by Fault
“Statistical invisibility for collusion-resistant digital Injection and Behavior Monitoring. In 12th
video watermarking. International World Wide Web Conference
(WWW), 2003.
[5] Y Liu, Y. Guo, and C. Liang, “A survey on
peer-to-peer video streaming systems,” Peer-to-Peer [16]. Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-
Networking and Applications, T. Lee, and S.-Y. Kuo. Securing Web Application
Code by Static Analysis and Runtime Protection. In
[6] K. Matsuda, H. Nakayama, and N. Kato, “A
13th International World Wide Web Conference,
Study on Streaming Video Detection using
2004.
Dynamic Traffic Pattern,”
[17]. Java Q & A - Session State in the Client Tier.
[7]. A. Barron, "Universal approximation bounds
http://Java.sun.com/ blueprints/qanda/
for superpositions of a sigmoidal function",
client_tier/session_state.html, 2006
[8]. M. Basseville and I. V. Nikiforov, Detection of
[18]. Injection Points in Real word XSS
Abrupt Changes: Theory and Applications, 1993
http://sandsprite.com/Sleuth/papers/RealWorld_XS
:Prentice-Hall
S_2.html
[9]. J. Chen and R. J. Patton, Robust Model-Based
[19]. P. Vogt, F. Nentwich, N. Jovanovic, C.
Fault Diagnosis for Dynamic Systems, 1999
Kruegel, E. Kirda, and G. Vigna. ―Cross site
:Kluwer
scripting prevention with dynamic data tainting and
[10]. R. N. Clark, "Instrument fault static analysis‖, 14th Annual Network and
detection", IEEE Trans. Aero. Eletron. Syst., vol. Distributed System Security Symposium (NDSS),
AES-14, pp.456 -465 1978 2007.
[11]. Chan-il woo1 and seung-dae lee2 (2013) [20] E. Gal´an, A. Alcaide, A. Orfila, J. Blasco,
international journal of smart home vol.7, no.5, ―A Multi–agent Scanner to Detect Stored–XSS
pp.115- Vulnerabilities‖, IEEE International Conference on
124,http://dx.doi.org/10.14257/ijsh.2013.7.5.12 Internet Technology and Secure Transactions
issn: 1975-4094 ijsh “Digital Watermarking For (ICITST), pp.332-337, June 2010
Image Tamper Detection Using Block-Wise
Technique” [21] M. James Stephen, P.V.G.D. Prasad Reddy,
Ch. Demudu Naidu Prevention of Cross Site
[12]. David X. Wei Cheng Jin Steven H. Low Scripting with E-Guard Algorithm‖, International
Sanjay Hegde in( Dec 2006).in IEEE/ACM Journal of Computer Applications Volume 22–
Transactions on Networking, Volume. 14, Issue no. No.5, pp. 30-34, May 2011.
6, pp no.59,“FAST TCP: Motivation, Architecture,
Algorithms, Performance.” [22] XSS Attack Vectors at
http://ha.ckers.org/xss.html
[13]. M. Almgren, H. Debar, and M. Dacier. A
lightweight tool for detecting web server attacks. In [23] shar, l.; tan, h.; ―methods for defending
ISOC Symposium on Network and Distributed against cross site scripting attacks‖ ieee journal of
Systems Security (NDSS), 2000. computer, volume 44 issue 10, august 2011
www.ijrcse.com International Journal of Research in Computer Science & Engineering 3393
ISSN: 2321-5585 (Online)
IJRCSE Vol-5, Issue-6, Nov - Dec, 2015 ISSN: 2321-0338 (Print)

[24]. StripeFramework,http://stripes.sourceforge.net
/docs/current/javadoc /index.html
[25]. WEB4J Framework,
http://www.web4j.com/UserGuide.jsp#XSS

Yedluri Deepika. She received B.Tech in CSE


from Narasaraopeta
Engineering College, JNTU
Kakinada in the year 2013.
Presently she is pursuing
M.TECH in CSE from
Vignan’s Lara Inistitute of
Technology &Science,
Vadlamudi, GunturDt, Andhrapradesh, India .she
Attended various National Workshops on
Networking. Deepikay112@gmail.com.

3394 International Journal of Research in Computer Science & Engineering www.ijrcse.com

You might also like