This paper is published in Volume-4, Issue-3, 2018
Area
Computer Network
Author
Rajeshwari K R, R Nagaraja
Org/Univ
Bangalore Institute of Technology, Bengaluru, Karnataka, India
Pub. Date
22 May, 2018
Paper ID
V4I3-1504
Publisher
Keywords
Named Data Network, Encryption, File Transfer Protocol, Router, IP Address.

Citationsacebook

IEEE
Rajeshwari K R, R Nagaraja. Infrastructure security- Data transfer protection from attacks in named data network, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Rajeshwari K R, R Nagaraja (2018). Infrastructure security- Data transfer protection from attacks in named data network. International Journal of Advance Research, Ideas and Innovations in Technology, 4(3) www.IJARIIT.com.

MLA
Rajeshwari K R, R Nagaraja. "Infrastructure security- Data transfer protection from attacks in named data network." International Journal of Advance Research, Ideas and Innovations in Technology 4.3 (2018). www.IJARIIT.com.

Abstract

In recent times, Attacks have become widespread, and they are difficult to detect in networks. It is because of their neighboring, simple and effective characteristics, Denial of Service (DoS), Distributed DoS attacks are recognized as one of the main threats faced by Network Services. To cope with the attacker problem, we have proposed a solution for Infrastructure security for the data transmission in the Named Data Network (NDN) by File Transfer Protocol (FTP), which combines the data encryption, satisfies the requirement of secure data transfer and also using dynamic routing protocols for secure web pages, file access through the routers from an unauthorized access. We have to check whether the user is the third party or not. If a user is the third party then he fails to login within the limited access time then admin will block that particular IP address. By this, we can provide a satisfied level of security to the infrastructure of the organization. This is simulated in Cisco Packet Tracer.