Papers by Vaishali Kansal
IEEE Transactions on Computational Social Systems
the wireless mesh network is a new emerging technology that will change the world of industrial n... more the wireless mesh network is a new emerging technology that will change the world of industrial networks connectivity to more efficient and profitable. Mesh networks consist of static wireless nodes and mobile customer; have emerged as a key technology for new generation networks. The QoS is designed to promote and support multimedia applications (audio and video), real time (ToIP, VoIP). However guarantee of QoS on wireless networks is a difficult problem by comparison at its deployment in a wired IP network. The reason is the random mobility of nodes, the nature of wireless channel (interference), the multi-hop communication and the lack of a central coordinating authority. Wireless Mesh Networks (WMNs) are commonly considered the most suitable architecture because of their versatility that allows flexible configurations. This paper mainly focuses on classification layer of the largest existing approaches dedicated to QoS. It is also discussing the most interesting works on QoS in...
ArXiv, 2020
Distributed Denial of Service (DDoS) attacks are serious cyber attacks and mitigating DDoS attack... more Distributed Denial of Service (DDoS) attacks are serious cyber attacks and mitigating DDoS attacks in cloud is a topic of ongoing research interest which remains a major security challenge. Fog computing is an extension of cloud computing which has been used to secure cloud. Moving Target Defense (MTD) is a newly recognized, proactive security defense that can be used to mitigate DDoS attacks on cloud. MTD intends to make a system dynamic in nature and uncertain by changing attack surface continuously to confuse attackers. In this paper, a novel DDoS mitigation framework is presented to support Cloud-Fog Platform using MTD technique (CFPM). CFPM applies migration MTD technique at fog layer to mitigate DDoS attacks in cloud. It detects attacker among all the legitimate clients proactively at the fog layer and isolate it from innocent clients. CFPM uses an effective request handling procedure for load balancing and attacker isolation procedure which aims to minimize disruption to clou...
2017 International Conference on Computing, Communication and Automation (ICCCA), 2017
Among the several threats to cyber services Distributed denial-of-service (DDoS) attack is most p... more Among the several threats to cyber services Distributed denial-of-service (DDoS) attack is most prevailing nowadays. DDoS involves making an online service unavailable by flooding the bandwidth or resources of a targeted system. It is easier for an insider having legitimate access to the system to circumvent any security controls thus resulting in insider attack. To mitigate insider assisted DDoS attacks, this paper proposes a moving target defense mechanism that involves isolation of insiders from innocent clients by using attack proxies. Further using the concept of load balancing an effective algorithm to detect and handle insider attack is developed with the aim of maximizing attack isolation while minimizing the total number of proxies used.
International Conference on Intelligent Computing and Smart Communication 2019
2017 International Conference on Computer, Communications and Electronics (Comptelix)
The increased number of cyber attacks makes the availability of services a major security concern... more The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from accessing the services. It is easier for an insider having legitimate access to the system to deceive any security controls resulting in insider attack. This paper proposes an Early Detection and Isolation Policy (EDIP)to mitigate insider-assisted DDoS attacks. EDIP detects insider among all legitimate clients present in the system at proxy level and isolate it from innocent clients by migrating it to attack proxy. Further an effective algorithm for detection and isolation of insider is developed with the aim of maximizing attack isolation while minimizing disruption to benign clients. In addition, concept of load balancing is used to prevent proxies from getting overloaded.
Uploads
Papers by Vaishali Kansal