Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
 
Articles by T. Ravichandran
Total Records ( 5 ) for T. Ravichandran
  S. Karthik , V.P. Arunachalam and T. Ravichandran
  Distributed Denial of Service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. IP traceback-the ability to trace IP packets from source to destination-is a significant step toward identifying and thus, stopping, attackers. The IP traceback is an important mechanism in defending against Distributed Denial of Service (DDoS) attacks. This study constructs a simulation environment via extending ns2, setting attacking topology and traffic, which can be used to evaluate and compare the effectiveness of different traceback schemes. A comparison among some of the Packet Marking schemes is presented with several metrics, including the received packet number required for reconstructing the attacking path, computation complexity and false positive etc. The simulation approach also can be used to test the performing effects of different marking schemes in large-scale DDoS attacks. Based on the simulation and evaluation results, more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
  T. Ravichandran and K. Durai Samy
  One of the most difficult problems in speech analysis is reliable discrimination among Silence, Unvoiced and Voiced speech. Although several methods have been proposed for making this three level decision, this study provides a method to detect weak fricatives by Voice Activity Detection (VAD). VAD can be viewed as a decision problem in which detector decides between speech and silence. The signal is sliced into contiguous frames. Energy of a frame indicates the possible presence of voice data as it has high energy. Based on the assumption that zero crossing rates for speech and noise are generally different, low energy speech can be refined. High correlation found in speech samples can be exploited to detect weak fricatives. Various test samples are used by varying accent, loudness of male voice and female voice. A comparison of relative merits and demerits of three time domain VAD algorithms along with the subjective quality of speech after pruning of silence periods is presented .VAD is used in a variety of speech communication systems such as speech coding, speech recognition, hands-free telephony, audio conferencing and echo cancellation.
  S. Karthik , V.P. Arunachalam and T. Ravichandran
  Denial of Service (DoS) attacks constitutes one of the major threats and among the hardest security problems in today‚Äôs internet. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, a DDoS attack can easily exhaust the computing and communication resources of its victim within a short period of time. Because of the seriousness of the problem, many defense mechanisms have been proposed to combat these attacks. This study aims to provide an understanding of the existing attack methods, tools and defense mechanisms, so that a better understanding of DDoS attacks can be achieved. The goal of the study is to simulate an environment by extending NS2, setting attacking topology and traffic, which can be used to evaluate and compare the methods of DDoS attacks and tools. Based on the simulation and evaluation results, more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
  K. Peruyakaruppan and T. Ravichandran
  Computers have become incredibly smaller, cheaper and numerous since the last decade. Interconnecting them, results in a computer network. Researchers say that two computers are interconnected if they can exchange information. Two computers are said to be autonomous, if one does not control the other. A computer network is an interconnected collection of autonomous computers. Connection of two or more distinct networks results in internetworking. Sometimes, a computer network is also called as a distributed network. Strictly speaking, a distributed system is a computer network with a high degree of cohesiveness. Networks satisfy a broad range of purposes and meet various requirements. Facilitating communications, sharing hardware, files, data, information and software are some of the common objectives of computer communication networks. This study presents the survey on principles on network design and topological design of the computer network.
  S. Karthik , S. Kannan , V.P. Arunachalam , T. Ravichandran and M.L. Valarmathi
  Denial of Service (DoS) attacks constitutes one of the major threats and among the hardest security problems in today's Internet. Of particular concern are Distributed Denial of Service (DDoS) attacks whose impact can be proportionally severe. With little or no advance warning, a DDoS attack can easily exhaust the computing and communication resources of its victim within a short period of time. Because of the seriousness of the problem many defense mechanisms have been proposed to combat these attacks. This study aims to provide an understanding of the existing attack methods, tools and defense mechanisms, so that a better understanding of DDoS attacks can be achieved. The goal of the study is to simulate an environment by extending NS2, setting attacking topology and traffic which can be used to evaluate and compare the methods of DDoS attacks and tools. Based on the simulation and evaluation results, more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
 
 
 
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility