Abstract
The extensive usage of Internet is the major cause of more cyber-attacks. And these attacks are mainly with IP spoofing. So, the IOT devices must be secured to stop the IP spoofing and that involves the authorization of the source address of IP packets which are received at the gateway. This is important to stop an user who is unsanctioned from utilizing the IP address as the flooding packets and source to the gateway. From then on, the assigned bandwidth to allow users is used. All unique file names and file attributes are registered daily by tenants on the virtual machine and from these file lists and IP events often import specific data into CSP. Then, the assessing task will be done by the TWCP for remaining everyday log details and mailing the security risk information to all the tenants. We designed and implemented the DTOS program (DNS TRAFFIC QUERY PROGRAM) to analyze the DNS traffic. The previous IP address and also the calculation of the next IP address were performed. The analyzing and the prediction of the IP address is done mainly in two important cloud computing providers and discovered that the real entropy given by the specified IP addresses is restricted. Here, we consider many predictive models, such as the Markov process model which produces prediction data of the addresses from the connected IP addresses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M.A. Venkatesulu, IP routing, in Linux TCP/IP Architecture, Design and Implementation. 2008, Press: Wiley-IEEE. 900 p.
D.E., Comer Internetworking With the concepts, protocols, and architecture of TCP/IP Ed., Sixth Edition. 1. 1. 1. 2014: PHI PVT-learning. LTD.
C.M., Kozierok TCP/IP Guide A Reference Comprehensive, Illustrated Internet Protocols. 2005: Publisher and distributor Shroff PVT. LTD. India
M.S. Reynolds, DDoS Internet based attacks of the next decade, in IEEE Systems Assurance Conference, Man and Cybernetics Knowledge Society, 2003
A. Mukaddam, et al., IP detection spoofing using changed hop count, in 28th International Conference on Advanced Knowledge Networking and Applications (IEEE), 2014
C. Jin, N. Agrawal, K.G. Shin, Protection against spoofed IP traffic using Filtering Hop-Count. IEEE/ACM Netw. Trans. 15(1), 40–53 (2007)
S. Tapaswi, N.A. Agrawal, Lightweight approach to detect spoofed cloud DDoS attacks at low/high rate IP, in IEEE 7th International Symposium on Cloud Computing and Infrastructure (SC2) in 2017, Aug 2017
S.G. Bhirud, V. Katkar, Light weight strategy for identification and prevention of IP-ARP spoofing, in 2011 Second International Internet Conference of the Asian Himalayas (AH-ICI), Aug 2011
C. Fancy, K.R. Santhosh, A dedicated setup for spoofing identification via IP-traceback, in International Conference on Smart Sustainable Systems (ICISS), 2017
K. Benton, et al., Filtering spoofing of source IP using feasible reverse path forwarding with SDN, in 2015 IEEE Communications and Network Security Conference (CNS), Aug 2015
A. Christy, P. Thambidurai, Efficient information extraction using machine learning and classification using genetic and C4. 8 algorithms. Inform. Technol. J. 5, 1023–1027 (2006)
M.P. Selvan, R. Selvaraj, Monitoring Fishy activity of the user in social networking, in 2017 International Conference on Information Communication and Embedded Systems (ICICES), Feb 2017. IEEE (2017), pp. 1–5
E. Weippl, K. Krombholz, J. Ullrich A. Dabrowski, H. Hobel, Security IPv6: Attacks and countermeasures in nutshell, in The 8th USENIX Offensive Technology Workshop (WOOT 14), San Diego, CA: Asociación USENIX, 2014
P. Kieseberg, J. Ullrich, K. Krombholz, Recognition with IPv6: a pattern-based approach to scanning, in 10th International Conference on Availability, Reliability and Security 2015, Aug 2015, pp. 186–192
M. Selvi, P.M. Joe Prathap, WSN data aggregation of dynamic routing by QoS analysis. J. Adv. Res. Dyn. Control Syst. 9(18), 2900–2908 (2017)
S. Prince Mary, D. Usha Nandini, B. Ankayarkanni, R. Sathyabama Krishna, Big data deployment for an efficient resource prerequisite job. J. Comput. Theor. Nanosci. 16(8), 3211–3215 (2019)
Sheela, A.C. Santha, C. Kumar, Duplicate web pages detection with the support of 2D table approach. J. Theor. Appl. Inf. Technol. 67(1) (2014)
S.L. JanyShabu, C. Jayakumar, Multimodal image fusion and bee colony optimization for brain tumor detection. J. Eng. Appl. Sci. Asian Res. Publ. Netw. (ARPN) 13(8), 2899–2904 (2018)
J. Refonaa, M. Lakshmi, Machine learning techniques for rainfall prediction using neural network. J. Comput. Theor. Nanosci. 16(1–5), 1546–1955 issue to be indexed in SCOPUS (2019)
J.K. Karthika, V.M. Anu, A. Veeramuthu, An efficient attribute based cryptographic algorithm for securing trustworthy storage and auditing for healthcare big data in cloud (2006)
S.P. Deore, A. Pravin, On-line devanagari handwritten character recognition using moments features, in International Conference on Recent Trends in Image Processing and Pattern Recognition, Dec 2018 (Springer, Singapore, pp. 37–48)
J. Wu. LAS, J. Bi, Zhang, An successful method of antispoofing, using existing information, in 23rd International Electronic Communications and Networks Conference (ICCCN), 2014
Levy and Bremler-Barr, Prevention of spoofing process, in Proceedings IEEE, 24th Annual Joint IEEE Computer and Communications Societies Conference, 2005
R.I. Minu, G. Nagarajan, Bridging the IoT gap through edge computing, in Edge Computing and Computational Intelligence Paradigms for the IoT (IGI Global, 2019), pp. 1–9
T.P. Jacob, Implementation of randomized test pattern generation strategy. J. Theor. Appl. Inf. Technol. 73(1) (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Manasa, V., Charishma Jayasree, A.C., Selvi, M. (2021). A Unified and End-to-End Methodology for Predicting IP Address for Cloud and Edge Computing. In: Bhoi, A.K., Mallick, P.K., Balas, V.E., Mishra, B.S.P. (eds) Advances in Systems, Control and Automations . ETAEERE 2020. Lecture Notes in Electrical Engineering, vol 708. Springer, Singapore. https://doi.org/10.1007/978-981-15-8685-9_60
Download citation
DOI: https://doi.org/10.1007/978-981-15-8685-9_60
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8684-2
Online ISBN: 978-981-15-8685-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)