The recent communication technology tends to be wirelessly for the mobility reason. Mobile Ad-hoc Network (MANET) can be established without any infrastructure or centralized controller. It can be constructed quickly in rural areas, military zones, and in emergency cases like earthquake. Three different types of routing protocols were categorized according to their work’s nature, which are Proactive, Reactive and Hybrid routing protocols. Due to the mobility characteristic of MANET nodes, routing protocols play important role in determining the network efficiency where the network topology is changed frequently. Many studies are conducted to analyze network performance and specify the best routing protocol using different simulation tools. In this paper, the performance of network is analyzed and evaluated when heterogeneous nodes are configured with these three types of protocols under heavy traffic load (VOIP). The result of our simulation shows that OLSR protocol has the highest throughput among others while DSR protocol shows the best performance in terms of Network load. Generally, the performance of routing protocol differs depending on the network type and use.
Cloud computing provides scalable, on-demand, and highly available computing services over the Internet to both the public and organizations on a pay-per-use basis. It provides a variety of services such as networking, storage space, and applications. The key issue for cloud computing is ensuring the confidentiality and privacy of cloud resources and data. Enticing the user to purchase cloud services requires their trust which cannot be guaranteed unless the infrastructure is effectively protected because attacks at this level will threaten the whole system. To this end, we propose the Integrated Intrusion Prevention and Detection System (IIPDS) to prevent and detect different types of attacks to the infrastructure level of the cloud system. The proposed design uses Trusted Third Party (TTP) services and SSL/TLS protocols as intrusion prevention methods to secure the communication between the cloud provider and the user. It also uses multiple Intrusion Detection Systems (IDS) distributed over multiple cloud regions. The IDS system is capable of detecting known and unknown attacks using anomaly and rule-based (signature) intrusion detection techniques. The simulation results proved the efficiency of the system in detecting a wide range of attacks with low false positive alerts and low computational overhead.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.