IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 2- Issue 10, October 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Access Rates Analysis Of Routing Stack Transformation

[Full Text]

 

AUTHOR(S)

Vincent Omollo, Dr. K. Langat, Dr. S. Musyoki, E. Ogari, P. Nyakomita

 

KEYWORDS

Key words: Routing stack, TCP/IP, flags, kernel, throughput

 

ABSTRACT

Abstract: The security of data is a very important aspect of every institution. One of the methods of boosting data security is by use of routing stack transformation. This approach successfully hides router inter-networking operating system from potential hackers by giving wrong or inaccurate results about the target operating system (including its manufacturer, model and version). This process normally involves changing the system kernel and modifying the transmission control protocol/Internet protocol (TCP/IP) parameters. In this paper, we investigated the effects of the above changes in data transmission rates (bit rates). This was done by use of experimentations before and after these alterations. A number of packets were sent from source and the time they take to reach the target is measured. This information was then used to determine the access rates in kilobits per second across a given communication link. We found that the network speeds were slightly reduced due to the TCP/IP and kernel changes. This could be attributed to the fact that network devices now took a long time trying to learn the format of the new packets, hence the subsequent delays. Due to this, a number of ways of boosting network speed are suggested. The simulated results tend to agree with the real trend observed in that in both scenarios, network access rates were reduced after routing stack transformation.

 

REFERENCES

[1]. B. M. Leiner, V. G. Cerf, D. D. Clark, R. E. Kahn, L. Kleinrock, D. C. Lynch, J. Postel, L. G. Roberts, and S. Wolff, “A brief history of the Internet,” SIGCOMM Computer Communication Review, vol. 39, no. 5, pp. 22–31, 2009.

[2]. Cisco Systems, Inc. “Cisco visual networking index: Forecast and methodology”, 2009–2014. White Paper, 2010.

[3]. Tobias Lauinger, “Security & Scalability of Content-Centric Networking”, 2010.

[4]. J. Yan, A. Blackwell, R. Anderson, and A. Grant. “Password memorability and security: Empirical results”. IEEE Security and Privacy, 2(5):25 – 31, September – October 2004.

[5]. CERT Coordination Center. “Incident and vulnerability trends”. Technical report, CERT, May 2003.

[6]. Vincent Omollo, Dr. Langat, Dr. Musyoki, “Secure LAN Architecture by using routing stack transformation”, 2013.