Table of Contents
International Scholarly Research Notices
Volume 2016, Article ID 9458627, 8 pages
http://dx.doi.org/10.1155/2016/9458627
Research Article

Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System

Department of Electronics, Goa University, Goa, India

Received 21 September 2016; Accepted 8 December 2016

Academic Editor: Aiguo Song

Copyright © 2016 Shaila Ghanti and G. M. Naik. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Evans, The Internet of Things. How the Next Evolution of Internet is Changing Everything, Cisco Internet Business Solutions Group (IBSG), San Jose, Calif, USA, 2011.
  2. http://www.howtogeek.com/217463/wi-fi-vs.-ethernet-how-much-better-is-a-wired-connection/.
  3. O. Hahm, E. Baccelli, H. Petersen, and N. Tsiftes, “Operating systems for low-end devices in the internet of things: a survey,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 720–734, 2016. View at Publisher · View at Google Scholar
  4. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: a survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. V. Vujović and M. Maksimović, “Raspberry Pi as a sensor web node for home automation,” Computers & Electrical Engineering, vol. 44, pp. 153–171, 2015. View at Google Scholar
  6. V. Vujović and M. Maksimović, “Raspberry Pi as a wireless sensor node: performances and constraints,” in Proceedings of the 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO '14), pp. 1013–1018, Opatija, Croatia, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. “April 2015 neustar DDoS attacks and protection report: North America,” April 2015 neustar DDoS attacks an https://ns-cdn.neustar.biz/creative_services/biz/neustar/www/resources/whitepapers/it-security/ddos/2015-us-ddos-report.pdf?_ga=1.116221262.91053301.143671.
  8. Y. Ohsita, S. Ata, and M. Murata, “Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically,” IEICE Transactions on Communications, vol. E89-B, no. 10, pp. 2868–2877, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. M. E. Manna and A. Amphawan, “Review of syn-flooding attack detection mechanism,” International Journal of Distributed and Parallel systems, vol. 3, no. 1, pp. 99–117, 2012. View at Publisher · View at Google Scholar
  10. S. S. Kolahi, A. A. Alghalbi, A. F. Alotaibi, S. S. Ahmed, and D. Lad, “Performance comparison of defense mechanisms against TCP SYN flood DDoS attack,” in Proceedings of the 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT '14), pp. 143–147, St. Petersburg, Russia, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. P. Ferguson and D. Senie, “Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing,” 1997.
  12. J. Lemon, “Resisting SYN flood DoS attacks with a SYN cache,” in Proceedings of the BSD Conference on BSD Conference (BSDC '02), p. 10, San Francisco, Calif, USA, February 2002.
  13. A. Zuquete, “Improving the functionality of SYN cookies,” in Advanced Communications and Multimedia Security, pp. 57–77, Springer, Berlin, Germany, 2002. View at Google Scholar
  14. M. Chouman, H. Safa, and H. Artail, “A novel defense mechanism against SYN flooding attacks in IP networks,” in Proceedings of the Canadian Conference on Electrical and Computer Engineering (2005), May 2005. View at Publisher · View at Google Scholar · View at Scopus
  15. D. Gillman, Y. Lin, B. Maggs, and R. K. Sitaraman, “Protecting websites from attack with secure delivery networks,” Computer, vol. 48, no. 4, Article ID 7085639, pp. 26–34, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Fichera, L. Galluccio, S. C. Grancagnolo, G. Morabito, and S. Palazzo, “OPERETTA: an OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers,” Computer Networks, vol. 92, pp. 89–100, 2015. View at Publisher · View at Google Scholar · View at Scopus
  17. N. N. Joshi, P. K. Dakhole, and P. P. Zode, “Embedded web server on Nios II embedded FPGA platform,” in Proceedings of the 2nd International Conference on Emerging Trends in Engineering & Technology (ICETET '09), pp. 372–377, Nagpur, India, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. K. V. Karthikeyan and K. Gomathy, “FPGA implementation of modified secured web server,” International Journal of Engineering and Technology, vol. 5, no. 5, pp. 3757–3763, 2013. View at Google Scholar · View at Scopus
  19. W. H. Guo, T. Chen, and W. A. N. Chaohua, “Server protection from distributed denial of service attacks,” Google Patents, 2014.
  20. D. Laturnas and R. Bolton, “Dynamic silicon firewall,” in Proceedings of the Canadian Conference on Electrical and Computer Engineering 2005, pp. 304–307, Saskatchewan, Canada, May 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. K. Koht-Arsa and S. Sanguanpong, “A centralized state repository approach to highly scalable and high-availability parallel firewall,” Journal of Computers (Finland), vol. 8, no. 7, pp. 1664–1676, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Wong and V. Kapila, “Internet-based remote control of a DC motor using an embedded ethernet microcontroller,” in Proceedings of the ASEE 2004 Annual Conference and Exposition, “Engineering Researchs New Heights”, vol. 9, pp. 8199–8214, Salt Lake City, Utah, USA, June 2004. View at Scopus
  23. L. Putra, Michael, Yudishtira, and B. Kanigoro, “Design and implementation of web based home electrical appliance monitoring, diagnosing, and controlling system,” Procedia Computer Science, vol. 59, pp. 34–44, 2015. View at Publisher · View at Google Scholar
  24. M. Can Filibeli, O. Ozkasap, and M. Reha Civanlar, “Embedded web server-based home appliance networks,” Journal of Network and Computer Applications, vol. 30, no. 2, pp. 499–514, 2007. View at Publisher · View at Google Scholar · View at Scopus
  25. H. Demel, FPGAs Solve Challenges at the Core of IoT Implementation, Lattice Semiconductor Corporation, 2016.
  26. “SynDefender,” Check Point Software Technologies Ltd, http://www.checkpoint.com.
  27. C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, “Analysis of a denial of service attack on TCP,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '97), May 1997.
  28. H. Wang, D. Zhang, and K. G. Shin, “Detecting SYN flooding attacks,” in Proceedings of the IEEE Information Communications Conference (INFOCOM '02), vol. 3, New York, NY, USA, June 2002. View at Publisher · View at Google Scholar
  29. S. R. Ghanti and G. M. Naik, “Protection of server from SYN flood attack,” International Journal of Electronics and Communication Engineering & Technology (IJECET), vol. 5, no. 11, pp. 37–46, 2014. View at Google Scholar
  30. S. Geravand and M. Ahmadi, “Bloom filter applications in network security: a state-of-the-art survey,” Computer Networks, vol. 57, no. 18, pp. 4047–4064, 2013. View at Publisher · View at Google Scholar · View at Scopus
  31. “Triple-Speed Ethernet MegaCore,” https://www.altera.com/content/dam/altera-www/global/en_US/pdfs/literature/ug/ug_ethernet.pdf.
  32. “NIOS II Processor—Overview,” https://www.altera.com/products/processors/overview.html.
  33. “Embedded Peripherals IP User Guide,” https://www.altera.com/content/dam/altera-www/global/en_US/pdfs/literature/ug/ug_embedded_ip.pdf.
  34. “ALTERA Using Triple-Speed Ethernet on DE4 Boards,” ftp://ftp.altera.com/up/pub/Altera_Material/14.0/Tutorials/DE4/using_triple_speed_ethernet.pdf.
  35. Altera DE4 Development and Education Board, http://www.terasic.com.tw/cgi-bin/page/archive.pl?Language=English&No=501.
  36. “ALTERA Quartus II introduction Using Schematic Designs,” ftp://ftp.altera.com/up/pub/Altera_Material/11.0/Tutorials/Schematic/Quartus_II_Introduction.pdf.
  37. “ab—Apache HTTP server benchmarking tool,” https://httpd.apache.org/docs/2.4/programs/ab.html.
  38. Ostinato Network Traffic Generator Analyzer, http://ostinato.org/.
  39. R. Qualls, “How To Use ApacheBench To Do Load Testing on an Ubuntu 13.10 VPS,” How To Use ApacheBench To Do Load Te, https://www.digitalocean.com/community/tutorials/how-to-use-apachebench-to-do-load-testing-on-an-ubuntu-13-10-vps.