International Conference on Quality Up-gradation in Engineering, Science and Technology |
Foundation of Computer Science USA |
ICQUEST - Number 1 |
October 2014 |
Authors: Rahul Diwate, Surabhi Deshpande, Shaktikala |
bf36c98d-904b-4329-87d2-e3b25b4ea9da |
Rahul Diwate, Surabhi Deshpande, Shaktikala . Interference Detection and Prevention of Black Hole (Dos) Attack Using Honeypots. International Conference on Quality Up-gradation in Engineering, Science and Technology. ICQUEST, 1 (October 2014), 9-12.
Due to rapid increase in networking throughput and security threat, much research is been done in the field of computer science. But security susceptibility grows every day. DoS attacks are the most prominent threat to the networks around the world. This paper gives an introduction to various DoS attacks present in today's Ad Hoc networks and proposes a method to prevent or counter these attacks against the networks by using honeypots that are deployed into the network to mislead and trap the attacker and thus providing a two layer security to the Ad Hoc networks. Computer networks and information technology on in the wake of intensive growth of use of the whole, we now rely deeply on our network for even the most basic functions. Even a small hindrance to the network just about paralyses us. But there are severe threats looming around, like Blackhole attack Rushing attack Wormhole attack and many more known and unknown attacks. These attack affect the network unfavorably thus creating a chaos all around. Thus NETWORK SECUTIRY has become the priority of all organizations. Many security measures have been taken to counter the security attacks. But these measures are not up to the mark. In this paper we are going to give a detail review about Networks and all the types of know DoS (Denial of service) present in the system. We also propose how a new methodology to counter these attack by providing a two layer security to the network by the use of HONEYPOTS. These honeypots help them to mislead the attacker to itself, exposes itself to the attack and gathers the information about the attacker, the type of attack and the purpose of the attack. Thus the gathered information helps us to counter the given type of attack.