Explicit Query based Detection and Prevention Techniques for DDOS in MANET
@article{Singh2012ExplicitQB, title={Explicit Query based Detection and Prevention Techniques for DDOS in MANET}, author={Neha Singh and Sumit Chaudhary and Kapil Verma and A. K. Vatsa}, journal={International Journal of Computer Applications}, year={2012}, volume={53}, pages={19-24} }
The wireless adhoc networks are highly vulnerable to distributed denial of service (DDoS) attacks because of its unique characteristics such as open network architecture and shared wireless medium. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its legitimate users. The denial of service (DOS) does not result in information theft or any kind of information loss but can be very dangerous, as…
7 Citations
Comparative Analysis of Various Techniques of DDoS Attacks for Detection & Prevention and Their Impact in MANET
- Computer ScienceAsset Analytics
- 2019
The aim of this research work is to present a comparative analysis of various proposed tools and techniques for detection and prevention of DDoS attacks.
A Novel Technique to Defend DDOS Attack in Manet
- Computer Science
- 2019
A deep sight is presented into DDOS attacks and how they affect the MANET, also how these attacks can be defended in the network and how the network can be more secure by understanding the nature of attacks.
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation
- Computer ScienceIEEE Access
- 2019
A scalable LDoS attack detection architecture for both WSN and IoT is proposed and the experimental results demonstrate that the novel approach is highly effective to detect the LDoS attacked in the ZigBee WSN.
Analysis of Route Discovery Message Flooding Attack in Mobile Ad-Hoc Network
- Computer Science
- 2017
The detection of flooding attack is done by analyzing the behavior of nodes so that the legal connection can be established and the efficiency of the system increases and resource utilization is done properly.
An Enhanced K Nearest Neighbor Classifier for Malicious Node Detection in VANET
- Computer ScienceInternational Journal of Advanced Research in Science, Communication and Technology
- 2022
An enhanced k-Nearest Neighbor classifier that detected the malicious node in VANET and achieves 20-25% improvement in communication overhead and delay metrics and helps to minimize the computational storage costs.
Improved Route Reliability to Overcome Route Flooding Attack in MANET
- Computer Science
- 2017
The DRRB approach results that it is efficiently and effectively detect the flooding attack in MANET and detects the malicious node with the opinion of neighboring nodes.
CARF-F: Conditional Active RREQ Flooding-Filter based Prevention Scheme for AODV in MANET
- Computer Science
- 2014
A novel CARF-F based flooding attack detection and removal mechanism for AODV protocol is proposed and at the initial level of analytical results the approach is proving its strong presence in near future.
References
SHOWING 1-10 OF 27 REFERENCES
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS Attack
- Computer Science
- 2011
The product of this study is detection of DDOS attack by using AODV (adhoc on demand distance vector) protocol, which is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well.
Detection and Control of DDOS Attacks over Reputation and Score Based MANET
- Computer Science
- 2011
This paper proposed the detection and control mechanism for DDOS attacks over reputation and score based MANET and a clustering technique uses the reputation and Score value of nodes to improve overall network performance and functionality.
Distributed Denial of Service Attacks in Mobile Adhoc Networks
- Computer Science
- 2011
The effects of different types of DDoS attacks in MANETs are highlighted and categorizes them according to their behavior to limit the services provided to their intended users.
Adaptive intrusion detection & prevention of denial of service attacks in MANETs
- Computer ScienceIWCMC
- 2009
This paper proposes an anomaly-based intrusion detection system that uses a combination of chi-square test & control chart to first detect intrusion and then identify an intruder, and shows that the algorithm performs well at an affordable processing overhead over the range of scenarios tested.
Malicious Nodes Detection in MANETs: Behavioral Analysis Approach
- Computer ScienceJ. Networks
- 2012
A new mechanism is proposed that improves the performance of routing protocol against the malicious attacks and proposes observing nodes behavior such as nodes’ mobility, and avoiding communication through these nodes which may lead to more secure routing.
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
- Computer Science
- 2012
The main aim is seeing the effect of DDoS in routing load, packet drop rate, end to end delay, i.e. maximizing due to attack on network and building secure IDS to detect this kind of attack and block it.
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
- Computer ScienceArXiv
- 2010
A proactive scheme is proposed that could prevent a specific kind of DoS attack and identify the misbehaving node and has the capability to prevent Distributed DoS (DDoS) as well.
A Trust Based Security Scheme for RREQ Flooding Attack in MANET
- Computer Science
- 2010
A novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol is presented.
Route Request Flooding Attack Using Trust based Security Scheme in Manet
- Computer Science
- 2012
How the flooding attack occur and the effect of flooding attack are described and simulation results are presented to show the detrimental effects of Flooding Attack.
The Modified Routing Protocol for Defending against Attacks in MANET
- Computer Science
- 2012
The reputation based system detects and isolates the DoS attack and provides better misbehavior detection efficiency, packet delivery ratio, and reduced packet dropping ratio, routing overhead, latency.