CFP last date
20 December 2024
Reseach Article

Quality based Bottom-up-Detection and Prevention Techniques for DDOS in MANET

by Laxmi Bala, A. K. Vatsa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 2
Year of Publication: 2012
Authors: Laxmi Bala, A. K. Vatsa
10.5120/8726-2412

Laxmi Bala, A. K. Vatsa . Quality based Bottom-up-Detection and Prevention Techniques for DDOS in MANET. International Journal of Computer Applications. 55, 2 ( October 2012), 12-19. DOI=10.5120/8726-2412

@article{ 10.5120/8726-2412,
author = { Laxmi Bala, A. K. Vatsa },
title = { Quality based Bottom-up-Detection and Prevention Techniques for DDOS in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 2 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number2/8726-2412/ },
doi = { 10.5120/8726-2412 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:56:43.786504+05:30
%A Laxmi Bala
%A A. K. Vatsa
%T Quality based Bottom-up-Detection and Prevention Techniques for DDOS in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 2
%P 12-19
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The distributed denial of service attack(DDoS) is a major threat to current internet security in MANET. Although the DDoS mechanism is widely understood, its detection is a very hard task because of the similarities between normal traffic and useless packet, sent by compromising host to their victims. Quality reducing attack is a new style of Distributed Denial of Service (DDoS) attack. The goodput and delay performance of TCP or UDP ?ows are very sensitive to such Quality reducing attacks. . In this paper a bottom up detection and prevention techniques for DDoS in MANET has been proposed thereby achieving an efficient quality of services provisioning. Our method relies on the use of monitoring and measurement techniques to evaluate the impact of SYN flooding attacks.

References
  1. Yinghua Guo and Ivan Lee, "Forensic analysis of DoS attack traffic in MANET",Fourth International Conference on Network and System Security,2010.
  2. Jie Wang, Raphael C. -W. Phan, John N. Whitley and David J. Parish, "Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method",10th IEEE International Conference on Computer and Information Technology ,2010.
  3. Rachana Yogesh patil and Lata Ragha, "A Rate Limiting Mechanism for Defending Against Flooding Based Distributed Denial of Service Attack", World Congress on Information and Communication Technologies, 2011.
  4. S. Venkatasubramanian and N. P. Gopalan, "A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET", International Journal of Computer Applications, Volume 21, No. 1, PP 0975 – 8887, May 2011.
  5. S. Gavaskar, R. Surendiran and Dr. E. Ramaraj, "Three Counter Defense Mechanism for TCP SYN Flooding Attacks", International Journal of Computer Applications ,Volume 6, No. 6, (0975 – 8887), September 2010.
  6. Bin Xiao, Wei Chenz, Yanxiang Hez and Edwin H. -M. Sha, "An Active Detecting Method Against SYN Flooding Attack",
  7. Mieso K. Denko, "Detection and Prevention of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme", Jouraral Systematics, Cybernatics and Informatics, vol 3, N0. 4.
  8. Jeevaa Katiravan, C. Chellappan and J. Gincy Rejula, "Detecting the Source of TCP SYN Flood Attack using IP Trace Back", European Journal of Scientific Research ISSN 1450-216X Vol. 71 No. 1, pp. 78-84,2012.
  9. Neeraj Sharma, B. L. Raina, Prabha Rani, Yogesh Chaba and Yudhvir Singh, "Attack Prevention Method Methods for DDOS Attack in MANET", Asian Journal Of Computer Science And Information Technology1:1, 18 – 21,2010.
  10. Vrizlynn L. L. Thing, Morris Sloman and Naranker Dulay, "Enhanced TCP SYN Attack Detection".
  11. Wei Chen and Dit-Yan Yeung, "Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. "
  12. L. Kavisankar and C. Chellappan, "CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack. "
  13. Maciej Korczy´nski, Lucjan Janowki and Andrzej Duda, "An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans. "
  14. Haining Wang, Danlu Zhang and Kang G. Shin "Detecting SYN Flood. "
  15. Steven J. Templeton and Karl E. Levitt, "Detecting Spoofed Packets. "
  16. Haining Wang, Cheng Jin and Kang G. Shin, "Defense Against Spoofed IP Traffic Using Hop-Count Filtering", IEEE/ACM Transaction on Networking, Vol. 15, No. 1, FEBRUARY 2007.
  17. Nallamala Sri Hari, N. Srinivas Rao and N. Satyanarayana, "A Novel Routing Attack in Mobile Ad Hoc Networks ", Indian Journal of Computer Science and Engineering, Vol. 1 ,No. 4, 382-391.
  18. Andrew Biggadike, Daniel Ferullo, Geoffrey Wilson and Adrian Perrig, "NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs".
  19. Bin Xiaoa, Wei Chenb and Yanxiang He, "An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently", J. Parallel Distributed Computing, 68 , 456 – 470, 2008.
  20. Qiming Li Temasek, Ee-Chien Chang and Mun Choon Chan "On the Effectiveness of DDoS Attacks on Statistical Filtering".
  21. Shashank Lagishetty, Pruthvi Sabbu and Kannan Srinathan, "DMIPS - Defensive Mechanism against IP Spoofing".
  22. Changhua Sun, Chengchen Hu, Yachao Zhou, and Xin Xiao,Bin Liu, "A More Accurate Scheme to Detect SYN Flood Attacks".
  23. Jarmo Molsa, "Mitigating DoS Attacks against the DNS with Dynamic TTL Values".
  24. S. A. Arunmozhi1and Y. Venkataramani "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks", International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 3, May 2011.
  25. Ruiliang Chen, Jung-Min Park and Randolph Marchany, "A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks", IEEE Transaction on Parallel on Dstributed Systems, Vol. 18, No. 5, May 2007.
  26. G. Pradeep Reddy, A. Ananda Rao, "An Implementation Of Botnet Detection Algorithm For Grid Networks", International Journal Communication & Network Security (IJCNS), Volume-I, Issue-II, 2011.
  27. Rodrigo Braga, Edjard Mota and Alexandre Passito,"Lightweight DDoS Flooding Attack Detection Using NOX/OpenFlow", 35th Annual IEEE Conference on Local Computer Networks LCN 2010.
  28. Aman Garg and A. L. Narasimha Reddy,"Mitigation of DoS attacks through QoS regulation. "
  29. Wei Ren, Dit-Yan Yeung, Hai Jin, and Mei Yang, " Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks", International Journal of Network Security, Vol. 4, No. 2, PP. 227-234, Mar. 2007.
  30. Haining Wang, and Kang G. Shin "Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks", IEEE Transaction on Parallel on Dstributed Systems, Vol. 14, No. 9, September 2003.
  31. Rizwan Khan and A. K. Vatsa, "Detection and Control of DDOS Attack over Reputation and Score Based MANET", Journal of Emerging Trends in computing and Information Sciences, Vol. 2,No. 11,October 2011.
Index Terms

Computer Science
Information Sciences

Keywords

DDoS attack TCP SYN flood attack TTL