Learn More
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet today. We propose a novel scheme for detecting and preventing the most harmful and difficult to detect DDoS Attacks—those that use IP address spoof-ing to disguise the attack flow. Our(More)
The recent advancements in technologies such as cellular networks, Wireless Sensor Networks (WSN), Radio-Frequency Identification (RFID), and Global Positioning System (GPS) have lead us to develop a realistic approach to tracking mobile assets. Tracking and managing the dynamic location of mobile assets is critical for many organizations with mobile(More)
Due to financial losses caused by distributed denial of service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We believe this paradigm should change in order to tackle the DDoS threat in its basis: thwart agent machines participation in DDoS attacks. Our proposal consists of developing an agent(More)
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is by(More)
Currently available asset tracking systems are not cost effective in mobile and wireless computing infrastructures, and they do not learn the asset’s route to act accordingly. Hence our main goal is to not only to track mobile assets by using an efficient geographical tracking approach, but also adapt their routes by means of intelligent route(More)
Ambient Networks enable co-operation between heterogeneous networks, on demand, in order to provide ubiquitous connectivity to end-users. We focus on the part of disseminating context information to enable context-based applications (for e.g., resource update and management) and systems in ambient and ubiquitous networks. Our pure overlay space architecture(More)
Software inspection is a method to detect errors in software artefacts early in the development cycle. At the end of the inspection process the inspectors need to make a decision whether the inspected artefact is of sufficient quality or not. Several methods have been proposed to assist in making this decision like capture recapture methods and Bayesian(More)
The dissemination of context information to enable context-awareness in various users, devices, and applications is a focus of current research in mobile network computing. The aim of our overall research is to build a balanced, adaptable, and interoperable overlay-based context dissemination mechanism for next generation networks. Our pure overlay space(More)
  • 1