Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 6
Abstract
In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad-hoc network does not have these types of network elements where the Intrusion Detection System (IDS) can collect and analyse audit data for the entire network. A number of neighbour-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad-hoc networks. The resources consumed by ad-hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. In this paper we are trying to protect our network from distributed denial of service attack (DDOS), In this paper we present method for determining intrusion or misbehave in MANET using intrusion detection system and protect the network from distributed denial of service (DDOS) and analysis the result on the bases of actual TCP flow monitoring, routing load ,packet delivery ratio and average end-to-end delay in normal , DDOS attack and IDS time .
Authors and Affiliations
Ramratan Ahirwal , Leeladhar Mahour
CONTROLLING BURST LOSS RATIO IN OBS USING FEEDBACK CONTROL AND DYNAMIC TECHNIQUES
Optical Burst Switching(OBS) is a switching technique used in optical network where data is sent as bursts. In this switching technique single burst loss can influence loss of multiple data. Hence Burst Loss Ratio (BLR)...
Recent Advances in SRE Research
The importance and the real potential of the Requirements ngineering is now being well recognized. A series of reversed as well as assorted researches are underway particularly on ‘ways to incorporate security right fro...
Novel Time Aware Regression Testing Technique
Regression testing comes into play when changes are made in the software. It is not possible to re-run all the previous test cases therefore, a minimization technique is required in order to reduce the test case suit. Th...
Clustering Mixed Data Set Using Modified MARDL Technique
Clustering is tend to be an important issue in data mining applications. Many clustering algorithms are available to cluster datasets that contain either numeric or categorical attributes. The real life database consists...
Common Framework For Unix Scripting Languages
With the thousands of commands available for the command line user to write own application based on some complex shell script or other script. The complexity implies more difficulties to make an efficient monitoring, ma...