We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Detecting Denail of Services Attacks in Wireless Network under the Distributed Jammer Network

by P. Mohanraj, A. Mummoorthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 9
Year of Publication: 2014
Authors: P. Mohanraj, A. Mummoorthy
10.5120/15013-3295

P. Mohanraj, A. Mummoorthy . Detecting Denail of Services Attacks in Wireless Network under the Distributed Jammer Network. International Journal of Computer Applications. 86, 9 ( January 2014), 23-24. DOI=10.5120/15013-3295

@article{ 10.5120/15013-3295,
author = { P. Mohanraj, A. Mummoorthy },
title = { Detecting Denail of Services Attacks in Wireless Network under the Distributed Jammer Network },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 9 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 23-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number9/15013-3295/ },
doi = { 10.5120/15013-3295 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:46.468751+05:30
%A P. Mohanraj
%A A. Mummoorthy
%T Detecting Denail of Services Attacks in Wireless Network under the Distributed Jammer Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 9
%P 23-24
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Wireless network it's based on ad-hoc wireless networks, where each node transfers data to the neighbour nodes. AP (Access Point) need not be in the reach of all the nodes in the network. Nodes around the AP forward the packets from the distant nodes to the next node. They can work in a decentralized fashion, are cheap with minimum investment for initial infrastructure, more reliable, scalable and provide increased coverage. The denial of service attacks (DoS) have become more and more frequent and caused some fatal problems in the recent time. Internet users experience Denial of- service (DoS) attacks every day. We are going to present an Analytical approach which will employ Reactive Defence Mechanism to mitigate the DoS attack and further improve network performance in terms of less computation time. The distributed jammer network (DJN) is composed of a large number of tiny, low power jammers distributed inside a target network with the purpose of jamming the target network. Phase change or phase transition uses the percolation theory. In percolation theory nodes are setup using random process. Further the simulation result proves it to be a better result oriented approach.

References
  1. PengT. , Leckie, C. DoS, Ramamohanarao, K. : Survey of network-based defense mechanisms countering the and DDoS problems. ACM Computing Surveys 39(1) (April 2007)
  2. Al-Duwairi, B. , Manimaran, G. : Novel hybrid schemes employing packet marking and logging for IP traceback. IEEE Transactions on Parallel and Distributed Systems 17(5) (May 2006) 403–418
  3. Dean, D. , Franklin, M. , Stubblefield, A. : An algebraic approach to IP traceback. ACM Transactions on Information and System Security 5(2) (May 2002) 119–137
  4. Gong, C. , Sarac, K. : Toward a practical packet marking approach for IP traceback. International Journal of Network Security (3) (May 2009) 271–281
  5. Li, J. , Sung, M. , Xu, J. , Li, L. : Large-scale IP traceback in high-speed Internet: Practical techniques and theoretical foundation. 2006
  6. Snoeren, A. C. , Partridge, C. , Sanchez, L. A. , Jones, C. E. , Tchakountio, F. , Kent, S. T. , Strayer, W. T. : Hash-based IP traceback. In: Proceedings of the ACM SIGCOMM. (2001) 3–14
  7. Yu, S. , Zhou, W. , Doss, R. , Jia, W. : Traceback of DDoS attacks using entropy variations. IEEE Transactions on Parallel and Distributed Systems 22(3) (March 2011) 412–425
  8. Mitzenmacher, M. , Upfal, E. : Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press (2005)
  9. CAIDA: Skitter project. http://www. caida. org/tools/measurement/skitter/
Index Terms

Computer Science
Information Sciences

Keywords

WN Ad-hoc Network DoS Jammer Access Point