IP traceback is one of the main challenges that face the security of today’s Internet. Many techniques were proposed, including in-band messaging and out-of-band messaging; each of them has pros and cons. Source IP spoofing attacks are critical issues to the Internet. These attacks are considered
An Improved IPTrace Security Detection in Distributed SSO Mechanism
During the last two decades the research community is extensively advising the use of Machine Learning systems for Network Security (anomaly detection). This paper concentrates on the design procedure of machine learning systems, explaining the basic terminology, also specifying the procedures on cr
In current trend overlay routing may be a terribly hanging theme that permits us necessary properties of the routing like delay or transmission control protocol, while not consider the typical dynamic values of underlying routing. Overlay routing was to recover transmission control protocol performa
Improving Performance of Overlay Routing Network Through Resource Allocation