We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

by Prajeet Sharma, Niresh Sharma, Rajdeep Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 21
Year of Publication: 2012
Authors: Prajeet Sharma, Niresh Sharma, Rajdeep Singh
10.5120/5824-8064

Prajeet Sharma, Niresh Sharma, Rajdeep Singh . A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network. International Journal of Computer Applications. 41, 21 ( March 2012), 16-21. DOI=10.5120/5824-8064

@article{ 10.5120/5824-8064,
author = { Prajeet Sharma, Niresh Sharma, Rajdeep Singh },
title = { A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 21 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number21/5824-8064/ },
doi = { 10.5120/5824-8064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:11.420199+05:30
%A Prajeet Sharma
%A Niresh Sharma
%A Rajdeep Singh
%T A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 21
%P 16-21
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a MANET is independently free to move in any direction, and will therefore change its connections to other devices frequently. So one of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. Ad hoc also contains wireless sensor network so the problems is facing by sensor network is also faced by MANET. While developing the sensor nodes in unattended environment increases the chances of various attacks. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main aim is seeing the effect of DDoS in routing load, packet drop rate, end to end delay, i. e. maximizing due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this paper we discussed some attacks on MANET and DDOS also and provide the security against the DDOS attack.

References
  1. F. Anjum, D. Subhadrabandhu and S. Sarkar. Signaturebased intrusion detection for wireless Ad-hoc networks," Proceedings of Vehicular Technology Conference, vol. 3, pp. 2152-2156, USA, Oct. 2003.
  2. D. E. Denning, An Intrusion Detection Model," IEEE Transactions in Software Engineering, vol. 13, no. 2, pp. 222- 232, USA, 1987.
  3. Wei-Shen Lai, Chu-Hsing Lin , Jung-Chun Liu , Hsun-Chi Huang, Tsung-Che Yang: Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks, International Journal of Software Engineering and Its Applications, Vol. 2, No. 4, pp. 61-72 (2008)
  4. ShabanaMehfuz, Doja,M. N. : Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs", Journal of Artificial Evolution and Applications (2008)
  5. Giriraj Chauhan,Sukumar Nandi: QoS Aware Stable path Routing (QASR) Protocol for MANETs, in First International Conference on Emerging Trends in Engineering and Technology,pp. 202-207 (2008).
  6. Xiapu Luo, Edmond W. W. Chan,Rocky K. C. Chang: Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals, EURASIP Journal on Advances in Signal Processing (2009)
  7. Xiaoxin Wu, David,K. Y. Yau, Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game theoretic Approach, in Proceedings of the 2nd ACM symposium on Information, computer and communication security, pp 365-367 (2006)
  8. S. A. Arunmozhi, Y. Venkataramani "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks" International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 3, May 2011, DOI: 10. 5121/ijnsa. 2011. 3312.
  9. Jae-Hyun Jun, Hyunju Oh, and Sung-Ho Kim "DDoS flooding attack detection through a step-by-step investigation" 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications, ISBN: 978-1-4673-0495-5,2011
  10. Qi Chen , Wenmin Lin , Wanchun Dou , Shui Yu " CBF: A Packet Filtering Method for DDoS Attack Defence in Cloud Environment", 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing. ISBN: 978-0-7695-4612-4. 2011
  11. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. , "Packet Leashes A Defense against Wormhole Attacks in Wireless Ad Hoc Networks" In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003
  12. Patroklos g. Argyroudis and donal o'mahony, "Secure Routingfor Mobile Ad hoc Networks", IEEE Communications Surveys & Tutorials Third Quarter 2005.
  13. Karan Singh, R. S. Yadav, Ranvijay International Journal of Computer Science and Security, Volume (1): Issue (1) 56
  14. I. Aad, J. -P. Hubaux, and E-W. Knightly, "Denial of ServiceResilience in Ad Hoc Networks," Proc. MobiCom, 2004.
  15. K. Balakrishnan, J. Deng, and P. K. Varshney, "TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks" Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), Mar. 2005.
  16. Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, "Black Hole Attack in Mobile Ad Hoc Networks" ACMSE'04, April 2-3, 2004, Huntsville, AL, USA.
  17. Yih-Chun Hu, Adrian Perrig, David B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols" WiSe 2003, September 19, 2003, San Diego, California, USA.
  18. Ponomarchuk, Yulia and Seo, Dae-Wha, "Intrusion Detection Based On Traffic Analysis in Wireless Sensor Networks" IEEE 2010.
  19. Network Simulator- ns-2. http://www. isi. edu/ nsnam /ns/.
  20. Yang, H. , Luo, H. , Ye, F. , Lu, S. , & Zhang, L. (2004), Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications, 11(1), 38-47.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mobile Ad-hoc Network Security Goal Security Attacks Defensive Mechanisms Challenges Ddos Attack