Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 6

Abstract

In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in which participating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches, routers and gateways, but an ad-hoc network does not have these types of network elements where the Intrusion Detection System (IDS) can collect and analyse audit data for the entire network. A number of neighbour-monitoring, trust-building, and cluster-based voting schemes have been proposed in the research to enable the detection and reporting of malicious activity in ad-hoc networks. The resources consumed by ad-hoc network member nodes to monitor, detect, report, and diagnose malicious activity, however, may be greater than simply rerouting packets through a different available path. In this paper we are trying to protect our network from distributed denial of service attack (DDOS), In this paper we present method for determining intrusion or misbehave in MANET using intrusion detection system and protect the network from distributed denial of service (DDOS) and analysis the result on the bases of actual TCP flow monitoring, routing load ,packet delivery ratio and average end-to-end delay in normal , DDOS attack and IDS time .

Authors and Affiliations

Ramratan Ahirwal , Leeladhar Mahour

Keywords

Related Articles

CONTROLLING BURST LOSS RATIO IN OBS USING FEEDBACK CONTROL AND DYNAMIC TECHNIQUES

Optical Burst Switching(OBS) is a switching technique used in optical network where data is sent as bursts. In this switching technique single burst loss can influence loss of multiple data. Hence Burst Loss Ratio (BLR)...

Recent Advances in SRE Research

The importance and the real potential of the Requirements ngineering is now being well recognized. A series of reversed as well as assorted researches are underway particularly on ‘ways to incorporate security right fro...

Novel Time Aware Regression Testing Technique

Regression testing comes into play when changes are made in the software. It is not possible to re-run all the previous test cases therefore, a minimization technique is required in order to reduce the test case suit. Th...

Clustering Mixed Data Set Using Modified MARDL Technique

Clustering is tend to be an important issue in data mining applications. Many clustering algorithms are available to cluster datasets that contain either numeric or categorical attributes. The real life database consists...

Common Framework For Unix Scripting Languages

With the thousands of commands available for the command line user to write own application based on some complex shell script or other script. The complexity implies more difficulties to make an efficient monitoring, ma...

Download PDF file
  • EP ID EP119664
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Ramratan Ahirwal, Leeladhar Mahour (2012). Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network. International Journal on Computer Science and Engineering, 4(6), 1164-1173. https://europub.co.uk/articles/-A-119664