CFP last date
20 December 2024
Reseach Article

Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks

by Deepak Vishwakarma, D.s. Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 9
Year of Publication: 2014
Authors: Deepak Vishwakarma, D.s. Rao
10.5120/17844-8747

Deepak Vishwakarma, D.s. Rao . Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks. International Journal of Computer Applications. 102, 9 ( September 2014), 23-26. DOI=10.5120/17844-8747

@article{ 10.5120/17844-8747,
author = { Deepak Vishwakarma, D.s. Rao },
title = { Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 9 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number9/17844-8747/ },
doi = { 10.5120/17844-8747 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:40.840589+05:30
%A Deepak Vishwakarma
%A D.s. Rao
%T Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 9
%P 23-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks are non-static networks which formed without any central point communication infrastructure. In addition to node mobility, a ad-hoc is defined by bounded resource constraints such as bandwidth, battery power, and storage space. In this network, the intermediate nodes play role of router which routed the packets to the terminal node. The security challenges in the networks have become a primary concern to provide secure communication. The Attacks on MANET disrupts network performance and reliability. The DOS (denial-of-service), Distributed denial-of-service (DDoS) attacks are a rapidly growing problem. The multitude and variety of both the attacks and the defence approaches is overwhelming. These attacks influences network resources, denying of service for genuine node and degrades network performance. In this paper kind of attacks are presented which are attacked on ad-hoc network and advised approach to detect DDoS attack.

References
  1. S. A. Arunmozhi, Y. Venkataramani, "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks", International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 3, May 2011.
  2. Mieso K. Denko, "Detection and Prevention of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme", SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3, NUMBER 4.
  3. Rizwan Khan, A. K. Vatsa, " Detection and Control of DDOS Attacks over Reputation and Score Based MANET ", Journal of Emerging Trends in Computing and Information Sciences VOL. 2, NO. 11, October 2011.
  4. H Yang , H Y. Luo , F Ye , S W. Lu , and L Zhang, " Security in mobile ad hoc networks: Challenges and solutions ", IEEE Wireless Communications-2008, pp. 38 – 47.
  5. Rizwan Khan, A. K. Vatsa, " Detection and Control of DDOS Attacks over Reputation and Score Based MANET ", Journal of Emerging Trends in Computing and Information Sciences VOL. 2, NO. 11, October 2011.
  6. L. Buttyan and J. Hubaux, "Stimulating cooperation in self- organizing mobile ad hoc networks", ACM/Kluwer Mobile Networks and Applications (MONET), 2003.
  7. M. Baker, E. Fratkin, D. Guitierrez, T. Li, Y. Liu and V. Vijayaraghavan, "Participation incentives for ad hoc networks", (2001).
  8. D. Barreto, Y. Liu, J. Pan and F. Wang, "Reputation-based participation enforcement for adhoc networks", (2002).
  9. S. Zhong, J. Chen and Y. R. Yang, "Sprite: A simple, cheat- proof, credit-based system for mobile ad-hoc networks," Technical Report 1235, Department of Computer Science, Yale University (2002).
  10. S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," In: Mobile Computing and Networking. (2000) 255–265.
  11. S. Buchegger and J. Y. L Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes — Fairness In Distributed Ad-hoc NeTworks," In Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, IEEE (2002) 226–236.
  12. P. Michiardi and R. Molva, "Making greed work in mobile ad hoc networks," Technical report, Institut Eur ?ecom (2002).
  13. Xiapu Luo, Edmond W. W. Chan,Rocky K. C. Chang: Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals, EURASIP Journal on Advances in Signal Processing (2009).
  14. Wei-Shen Lai, Chu-Hsing Lin , Jung-Chun Liu , Hsun-Chi Huang, Tsung-Che Yang: Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks, International Journal of Software Engineering and Its Applications, Vol. 2, No. 4, pp. 61-72 (2008).
  15. ShabanaMehfuz, Doja,M. N. : Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs", Journal of Artificial Evolution and Applications (2008).
  16. Xiaoxin Wu, David,K. Y. Yau, Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach, in Proceedings of the 2nd ACM symposium on Information, computer and communication security, pp 365-367 (2006).
  17. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks, ACM, Newyork,USA (2004) Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong: A New Routing Attack in Mobile Ad Hoc Networks, International Journal of Information Technology, Vol. 11, No. 2 (2005).
  18. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks, National Science Foundation under Grant No. 9985195, DARPA award N660001-00-18936 Riverside CA, Vikram Gupta,Srikanth Krishnamurthy and Michalis Faloutsos, MILCOM-Network Security, Anaheim, October 2002.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Attacks DoS Distributed DoS.