Explicit Query based Detection and Prevention Techniques for DDOS in MANET

@article{Singh2012ExplicitQB,
  title={Explicit Query based Detection and Prevention Techniques for DDOS in MANET},
  author={Neha Singh and S. Chaudhary and Kapil Verma and A. Vatsa},
  journal={International Journal of Computer Applications},
  year={2012},
  volume={53},
  pages={19-24}
}
The wireless adhoc networks are highly vulnerable to distributed denial of service (DDoS) attacks because of its unique characteristics such as open network architecture and shared wireless medium. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its legitimate users. The denial of service (DOS) does not result in information theft or any kind of information loss but can be very dangerous, as… Expand
Comparative Analysis of Various Techniques of DDoS Attacks for Detection & Prevention and Their Impact in MANET
TLDR
The aim of this research work is to present a comparative analysis of various proposed tools and techniques for detection and prevention of DDoS attacks. Expand
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation
TLDR
A scalable LDoS attack detection architecture for both WSN and IoT is proposed and the experimental results demonstrate that the novel approach is highly effective to detect the LDoS attacked in the ZigBee WSN. Expand
Analysis of Route Discovery Message Flooding Attack in Mobile Ad-Hoc Network
TLDR
The detection of flooding attack is done by analyzing the behavior of nodes so that the legal connection can be established and the efficiency of the system increases and resource utilization is done properly. Expand
CARF-F: Conditional Active RREQ Flooding-Filter based Prevention Scheme for AODV in MANET
TLDR
A novel CARF-F based flooding attack detection and removal mechanism for AODV protocol is proposed and at the initial level of analytical results the approach is proving its strong presence in near future. Expand
Improved Route Reliability to Overcome Route Flooding Attack in MANET
Wireless system is the system layer attack that wants to expand the system and node utilization, for example, data transfer, capacity and battery life to influence the ordinary preparing and demand.Expand

References

SHOWING 1-10 OF 27 REFERENCES
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS Attack
TLDR
The product of this study is detection of DDOS attack by using AODV (adhoc on demand distance vector) protocol, which is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well. Expand
Detection and Control of DDOS Attacks over Reputation and Score Based MANET
MANET is quickly spreading for the property of its capability in forming rapidly changing topologies network without the aid of any established infrastructure or centralized administration. TheExpand
Distributed Denial of Service Attacks in Mobile Adhoc Networks
TLDR
The effects of different types of DDoS attacks in MANETs are highlighted and categorizes them according to their behavior to limit the services provided to their intended users. Expand
Adaptive intrusion detection & prevention of denial of service attacks in MANETs
TLDR
This paper proposes an anomaly-based intrusion detection system that uses a combination of chi-square test & control chart to first detect intrusion and then identify an intruder, and shows that the algorithm performs well at an affordable processing overhead over the range of scenarios tested. Expand
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
TLDR
This paper discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks and used the medium access control (MAC) layer information to detect the attackers. Expand
Malicious Nodes Detection in MANETs: Behavioral Analysis Approach
TLDR
A new mechanism is proposed that improves the performance of routing protocol against the malicious attacks and proposes observing nodes behavior such as nodes’ mobility, and avoiding communication through these nodes which may lead to more secure routing. Expand
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
TLDR
The main aim is seeing the effect of DDoS in routing load, packet drop rate, end to end delay, i.e. maximizing due to attack on network and building secure IDS to detect this kind of attack and block it. Expand
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
TLDR
A proactive scheme is proposed that could prevent a specific kind of DoS attack and identify the misbehaving node and has the capability to prevent Distributed DoS (DDoS) as well. Expand
Techniques for resilience of Denial of service Attacks in Mobile Ad Hoc Networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. In this paper, we study DoS attacks in order to assess the damage that difficult-to-detect attackers canExpand
A Trust Based Security Scheme for RREQ Flooding Attack in MANET
TLDR
A novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol is presented. Expand
...
1
2
3
...