A. Kannammal

Learn More
Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of(More)
This paper proposes a novel technique to generate an irrevocable cryptographic key from the biometric template. The biometric trait considered here is the palm vein. The technique proposed here utilises the minutiae features extracted from the pattern generated. The features include bifurcation points and ending points. Since other cryptographic keys are(More)
Mobile Ad-hoc Networks (MANET) provides direct peer-to-peer communication between mobile nodes without any infrastructure. During data transfer, it is possible that an attacker may initiate Distributed Denial of Service (DDoS) that may interfere the entire communication. In this paper, we propose a Hybrid Defense Mechanism based on Cluster Analysis. The(More)