Venkat Pothamsetty

Learn More
Security vulnerabilities have grown at a tremendous pace during the last decade. Security education and related courses in universities have caught up in the last few years. This paper aims to determine disparities, if any, between the security offerings of the academia and the needs of the computing industry. This paper also analyzes whether the academia(More)
Previous scanning worms have beensignificant sources of network congestion and have had catastrophic effects on switches, routers and end-systems. In this paper, we focus on the simulation of the secondary resource-exhaustion effects that scanning worms cause on network protocols operating in Internet routers. Specifically, we describe a preliminary(More)
A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distributed route assessment (reputation) system for a MANET context in which nodes attribute a route’s performance to their nearest neighbors on the route. Also, attribution to all(More)
Any operating system that uses an IP based protocol stack for its networking purposes will have an IP address at its network layer and will rely on its transport layer for reliable or unreliable transportation of the IP datagrams. It is well known that security is not one of the primary components in the initial design specifications IP/TCP/UDP protocol(More)
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. RFCs typically define what constitute "right" packets relevant to the protocol and they specify what the response should be for such packets. They are often ambiguous and remain silent on what the protocol implementation should do for packets which(More)
  • 1