Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 6
Abstract
In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad-hoc network does not have these types of network elements where the Intrusion Detection System (IDS) can collect and analyse audit data for the entire network. A number of neighbour-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad-hoc networks. The resources consumed by ad-hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. In this paper we are trying to protect our network from distributed denial of service attack (DDOS), In this paper we present method for determining intrusion or misbehave in MANET using intrusion detection system and protect the network from distributed denial of service (DDOS) and analysis the result on the bases of actual TCP flow monitoring, routing load ,packet delivery ratio and average end-to-end delay in normal , DDOS attack and IDS time .
Authors and Affiliations
Ramratan Ahirwal , Leeladhar Mahour
A Genetic Algorithm Approach for the Solution of Economic Load Dispatch Problem
This paper presents the application of Genetic algorithm (GA) to solve the economic load dispatch problem of the power system. The effectiveness of the proposed algorithm has been demonstrated on two different test syste...
Performance Evaluation of VoIP in Mobile WiMAX; Simulation and Emulation studies
Worldwide Interoperability for Microwave Access (WiMAX) is an acronym for IEEE 802.16 family which is a leading contemporary broadband wireless Access (BWA) technology. IEEE 802.16e is intended for mobile WiMAX, which su...
Grid Scheduling using Differential Evolution (DE) for solving multi-objective optimization parameters
The computational grid is a collection and aggregation of parallel, distributed, and heterogeneous resources. Grid Scheduling is the complex issue to manage the heterogeneous resources. The proposed approach considers th...
FCE: A QUALITY METRIC FOR COTS BASED SOFTWARE DESIGN
The software that is based on component is aimed at veloping large software systems thorough combining the xisting software components. Before integrate different omponents, first one need to identify whether functio...
A PATTERN RECOGNITION LEXI SEARCH APPROACH TO TRAVELLING SALESMAN PROBLEM WITH ADDITIONAL CONSTRAINTS
There are n cities and N = {1, 2,… n}. Let {1} be the headquarter city and the subheadquarter cities i.e.,H = {a1, a2… ah} be the subset of N. The cost array C (i, j) indicates the cost of the travelling salesman by visi...