Explicit Query based Detection and Prevention Techniques for DDOS in MANET

@article{Singh2012ExplicitQB,
  title={Explicit Query based Detection and Prevention Techniques for DDOS in MANET},
  author={Neha Singh and Sumit Chaudhary and Kapil Verma and A. K. Vatsa},
  journal={International Journal of Computer Applications},
  year={2012},
  volume={53},
  pages={19-24}
}
The wireless adhoc networks are highly vulnerable to distributed denial of service (DDoS) attacks because of its unique characteristics such as open network architecture and shared wireless medium. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its legitimate users. The denial of service (DOS) does not result in information theft or any kind of information loss but can be very dangerous, as… 

Figures from this paper

Comparative Analysis of Various Techniques of DDoS Attacks for Detection & Prevention and Their Impact in MANET

The aim of this research work is to present a comparative analysis of various proposed tools and techniques for detection and prevention of DDoS attacks.

A Novel Technique to Defend DDOS Attack in Manet

A deep sight is presented into DDOS attacks and how they affect the MANET, also how these attacks can be defended in the network and how the network can be more secure by understanding the nature of attacks.

A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation

A scalable LDoS attack detection architecture for both WSN and IoT is proposed and the experimental results demonstrate that the novel approach is highly effective to detect the LDoS attacked in the ZigBee WSN.

Analysis of Route Discovery Message Flooding Attack in Mobile Ad-Hoc Network

The detection of flooding attack is done by analyzing the behavior of nodes so that the legal connection can be established and the efficiency of the system increases and resource utilization is done properly.

An Enhanced K Nearest Neighbor Classifier for Malicious Node Detection in VANET

  • Abhilash SonkerR. K. Gupta
  • Computer Science
    International Journal of Advanced Research in Science, Communication and Technology
  • 2022
An enhanced k-Nearest Neighbor classifier that detected the malicious node in VANET and achieves 20-25% improvement in communication overhead and delay metrics and helps to minimize the computational storage costs.

Improved Route Reliability to Overcome Route Flooding Attack in MANET

The DRRB approach results that it is efficiently and effectively detect the flooding attack in MANET and detects the malicious node with the opinion of neighboring nodes.

CARF-F: Conditional Active RREQ Flooding-Filter based Prevention Scheme for AODV in MANET

A novel CARF-F based flooding attack detection and removal mechanism for AODV protocol is proposed and at the initial level of analytical results the approach is proving its strong presence in near future.

References

SHOWING 1-10 OF 27 REFERENCES

Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS Attack

The product of this study is detection of DDOS attack by using AODV (adhoc on demand distance vector) protocol, which is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well.

Detection and Control of DDOS Attacks over Reputation and Score Based MANET

This paper proposed the detection and control mechanism for DDOS attacks over reputation and score based MANET and a clustering technique uses the reputation and Score value of nodes to improve overall network performance and functionality.

Distributed Denial of Service Attacks in Mobile Adhoc Networks

The effects of different types of DDoS attacks in MANETs are highlighted and categorizes them according to their behavior to limit the services provided to their intended users.

Adaptive intrusion detection & prevention of denial of service attacks in MANETs

This paper proposes an anomaly-based intrusion detection system that uses a combination of chi-square test & control chart to first detect intrusion and then identify an intruder, and shows that the algorithm performs well at an affordable processing overhead over the range of scenarios tested.

Malicious Nodes Detection in MANETs: Behavioral Analysis Approach

A new mechanism is proposed that improves the performance of routing protocol against the malicious attacks and proposes observing nodes behavior such as nodes’ mobility, and avoiding communication through these nodes which may lead to more secure routing.

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

The main aim is seeing the effect of DDoS in routing load, packet drop rate, end to end delay, i.e. maximizing due to attack on network and building secure IDS to detect this kind of attack and block it.

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

A proactive scheme is proposed that could prevent a specific kind of DoS attack and identify the misbehaving node and has the capability to prevent Distributed DoS (DDoS) as well.

A Trust Based Security Scheme for RREQ Flooding Attack in MANET

A novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol is presented.

Route Request Flooding Attack Using Trust based Security Scheme in Manet

How the flooding attack occur and the effect of flooding attack are described and simulation results are presented to show the detrimental effects of Flooding Attack.

The Modified Routing Protocol for Defending against Attacks in MANET

The reputation based system detects and isolates the DoS attack and provides better misbehavior detection efficiency, packet delivery ratio, and reduced packet dropping ratio, routing overhead, latency.