Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 6

Abstract

In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad-hoc network does not have these types of network elements where the Intrusion Detection System (IDS) can collect and analyse audit data for the entire network. A number of neighbour-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad-hoc networks. The resources consumed by ad-hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. In this paper we are trying to protect our network from distributed denial of service attack (DDOS), In this paper we present method for determining intrusion or misbehave in MANET using intrusion detection system and protect the network from distributed denial of service (DDOS) and analysis the result on the bases of actual TCP flow monitoring, routing load ,packet delivery ratio and average end-to-end delay in normal , DDOS attack and IDS time .

Authors and Affiliations

Ramratan Ahirwal , Leeladhar Mahour

Keywords

Related Articles

Cluster level optimization of residual energy consumption in wireless sensor networks for lifetime enhancement

Network lifetime is perhaps the most important metric for the evaluation of sensor networks. In a resource-constrained environment, the consumption of every limited resource must be considered The network can only fulfil...

Improving Throughput in Cloud Storage System

Because the cloud serves many workloads concurrently, its disk access pattern is highly random and heterogeneous. In addition, because various virtual machines access to files respectively, meta data utilization and smal...

Comparative study of various PKINIT methods used in Advanced Kerberos

Traditional authentication method is password, but it cannot resist dictionary and playback attack. Thus, applications, which send an unencrypted password over the network, are extremely vulnerable. Kerberos can be used...

Intelligent and Effective Heart Disease Prediction System using Weighted Associative Classifiers

The healthcare environment is still ‘information rich’ But ‘knowledge poor’. There is a wealth of data available within the health care systems. However, there is a lack of effective analysis tools to discover hidden rel...

Curve Length Estimation using Vertix Chain Code Curve Length Estimation

Most of the applications in image analysis are based on reeman chain code. In this paper, for the first time, vertex chain code (VCC) proposed by Bribiesca is applied to improve length estimation of the 2D digitized cur...

Download PDF file
  • EP ID EP119664
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Ramratan Ahirwal, Leeladhar Mahour (2012). Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network. International Journal on Computer Science and Engineering, 4(6), 1164-1173. https://europub.co.uk/articles/-A-119664