Detecting Multiple Malevolent Packet Losses
Identifying the victimized packets which are dropped in the router and revoking them for further utilization and also to protect from hackers. It is quite challenging to attribute a missing packet to a malevolent action because normal network congestion cannot produce the same effect. Static user-defined threshold and ? protocol approached this issue but it is fundamentally limiting, based on measured traffic rates and buffer sizes. This approach does not infer dynamically and here always a possibility of losing the packets. The number of congestive packet losses that will create an ambiguity.