DDoS Services Attacks In Mobile Ad-hoc Network
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
In vision of the growing demand for wireless information and data services, it is very important to providing faster and reliable mobile access to users. Today's, not only mobile phones, but also laptops and PDAs are used by people in their professional and private lives. These devices are used separately for the most part that is their applications do not interact. Sometimes, a group of mobile devices form a unstructured, temporary network as they move towards each other. This allows users to share documents, secret information and other useful information. This kind of unstructured, temporary network referred to as mobile ad hoc networks sometimes just called ad hoc networks or multi-hop wireless networks, and are expected to play an important role in our daily lives in near future. As the use of ad-hoc network increased the security concerned also needed to prevent the network from malicious users. In wired network , it is easy to provided security during transmission than the Mobile ad-hoc network. DDoS attack is a big problem in MANET. In these, paper we discussed about DDoS attacks and there detection mechanisms.
Authors and Affiliations
Anju, Vinod Saroha
Graphical Authentication using Captcha (A New Security Initiative Based on Hard AI problem)
Now a day’s security is an very important issue. The traditional security systems are easily hackable. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. In this pa...
Data Encryption & Decryption - A Review
The art of obtaining security by converting readable messages into non-readable is called Cryptography. It is the process of hiding secret information. The normal text also called plain text is visible and readable to a...
QoS Analysis using Traffic Pattern Forecasting of 5g SDN Cellular Networks
Traffic modeling and prediction are at the focal point of the assessment of the performance of tele communications network. In spite of the fact that the research carried on traffic prediction is a built up field, most...
Revenue and Profit Maximization of Intermediary by Providing Multiple Cloud Services to Users
Data streaming with various cloud condition is a potential response for give the profitable pay on demand respond in due order regarding tradeoff between whole deal leasing and contrasting burdens. In this paper, we pro...
slugSelection of merchant for Manufacturing industries through application of analytic hierarchy process
Selection of a genuine merchant is an important task for any Industry. In this paper the assessment and selection of a merchant is carried out through Analytic Hierarchy Process (AHP). AHP is a pairwise comparison techni...