We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Explicit Query based Detection and Prevention Techniques for DDOS in MANET

by Neha Singh, Sumit Chaudhary, Kapil Kumar Verma, A. K. Vatsa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 53 - Number 2
Year of Publication: 2012
Authors: Neha Singh, Sumit Chaudhary, Kapil Kumar Verma, A. K. Vatsa
10.5120/8393-2016

Neha Singh, Sumit Chaudhary, Kapil Kumar Verma, A. K. Vatsa . Explicit Query based Detection and Prevention Techniques for DDOS in MANET. International Journal of Computer Applications. 53, 2 ( September 2012), 19-24. DOI=10.5120/8393-2016

@article{ 10.5120/8393-2016,
author = { Neha Singh, Sumit Chaudhary, Kapil Kumar Verma, A. K. Vatsa },
title = { Explicit Query based Detection and Prevention Techniques for DDOS in MANET },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 53 },
number = { 2 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume53/number2/8393-2016/ },
doi = { 10.5120/8393-2016 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:53:05.588139+05:30
%A Neha Singh
%A Sumit Chaudhary
%A Kapil Kumar Verma
%A A. K. Vatsa
%T Explicit Query based Detection and Prevention Techniques for DDOS in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 53
%N 2
%P 19-24
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The wireless adhoc networks are highly vulnerable to distributed denial of service (DDoS) attacks because of its unique characteristics such as open network architecture and shared wireless medium. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its legitimate users. The denial of service (DOS) does not result in information theft or any kind of information loss but can be very dangerous, as it can cost the person a large amount of time and money. Significant efforts have been made towards making adhoc network secure and free from DDoS attacks. In this paper we study how various detection parameters together work as a single and efficient method to detect various DDoS attacks in Manet. Later in this paper a technique to prevent DDoS attacks in Manet is also presented which help in preventing the attacks to communicate in the network and did not allow them in the network.

References
  1. Yousof Al-Hammadi and Uwe Aickelin, "Detecting Botnets Through Log Correlation", volume 1, pp 1-4, January 2010.
  2. Ms. Neetu Singh Chouhan and Ms. Shweta Yadav, "Flooding Attacks Prevention in MANET", IJCTEE ,volume 1, Issue 3, pp 68- 72, November 2011.
  3. Shishir K. Shandilya and Sunita Sahu, "A Trust Based Security Scheme for RREQ Flooding Attack in MANET", International Journal of Computer Applications, volume 5, Issue 12, pp 4-8, August 2010.
  4. Kanchan and Sanjeev Rana, "Methodology for Detecting and Thwarting DoS in MANET", IJCA, volume NSC, Issue 1, pp 31-34, December 2011.
  5. Mansoor Alicherry, Angelos D. Keromytis and Angelos Stavrou, "Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks", SpringerLink, volume 19 part 1 , pp 41-50, 2009.
  6. G. S. Mamatha and Dr. S. C. Sharma, "A Highly Secured Approach against Attacks in MANETS", International Journal of Computer Theory and Engineering, volume 2, Issue no. 5, pp 815-818, October 2010.
  7. S. A. Arunmozhi and Y. Venkataramani, "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks", IJNSA, volume 3, Issue no. 3, pp 182-187, May 2011.
  8. Quan Jia,Kun Sun and Angelos Stavrou, "CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET", ICCN, August 2011.
  9. Gurjinder Kaur,Yogesh Chaba and V. K. Jain, "Distributed Denial of Service Attacks in Mobile Adhoc Networks", World Academy of Science, Engineering and Technology, volume
  10. Syed Atiya Begum, L. Mohan and B. Ranjitha, "Techniques for Resilience of Denial of Service Attacks in Mobile Ad Hoc Networks", IJECCE, volume 3, Issue no 1, pp 152-156, March 2012.
  11. S. Venkatasubramanian and N. P. Gopalan, "A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET", IJCA, volume 21, Issue no. 1, pp 7-10, May 2011.
  12. Adnan Nadeem and Michael Howarth, "Adaptive Intrusion Detection & Prevention of Denial of Service attacks in MANETs", IWCMC, pp 926-930, June 2009.
  13. Yaser Khamayseh, Ruba Al-Salah and Muneer Bani Yassein, "Malicious Nodes Detection in MANETs: Behavioral Analysis Approach", Journal of Networks, volume 7, Issue no. 1, pp 116-125, January 2012.
  14. Vikram Singh and Vatika, "Design & Implementation of Secure AODV in Multicast Routing To Detect DDOS Attack", IJNSA, volume 3, Issue no. 5, pp 43-57, September 2011.
  15. S. Kannan,T. Maragatham,S. Kartik and V. P Arunachalam, "A Study of Attacks, Attack Detection and Prevention Methods in Proactive and Reactive Routing Protocols", Medwell Journals, volume 5, issue no. 3, pp 178-183, 2011.
  16. Venkatesan Balakrishnan and Vijay Varadharajan, "Packet Drop Attack: A serious threat to operational Mobile Ad hoc Networks", IJSER, pp 1-7, 2005.
  17. Prajeet Sharma, Niresh Sharma and Rajdeep Singh, "A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network", IJCA, volume 41, Issue no. 21, March 2012.
  18. Sugata Sanyal, Ajith Abraham, Dhaval Gada, Rajat Gogri, Punit Rathod,Zalak ,Dedhia and Nirali Mody, "Security Scheme for Distributed DoS in Mobil Ad Hoc Networks", volume 2, May 2010.
  19. Wei Ren,Dit-Yan Yeung,Hai Jin and Mei Yang, "Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks", International Journal of Network Security,volume 4, Issue no. 2, pp 227-234, March 2007.
  20. Ujwala D. Khartad and R. K. Krishna, "Route Request Flooding Attack Using Trust based Security Scheme in Manet", IJSSAN, volume 1, Issue no. 4, pp 27-33, 2012.
  21. S. Gopinath, S. Maragatharaj and C. Rajalingam, " The Modified Routing Protocol for Defending against Attacks in MANET",International Journal of Advanced Research in Computer Science and Software Engineering, volume 2, Issue no. 1, pp 1-4, January 2012.
  22. Rizwan Khan and A. K Vatsa, "Detection and Control of DDOS Attacks over Reputation and Score Base MANET", Journal of Emerging Trends in Computing and Information Sciences, volume 2, Issue no. 11, pp 646-655, October 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Explicit query Mobile ad-hoc networks (MANET) Denial of service (DOS) Distributed denial-of-service (DDOS) detection prevention technique Blacklist