Mitigating Denial of Service Attacks in Wireless Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
The open nature of the wireless media becomes a root cause for denial of service attack. Denial of Service (DOS) can be different types and disrupt multiple layers. The idea here is to prevent the cyberspace from DOS attack. Zombie is a computer that has been compromised by the hackers for performing malicious activities. Group of zombie computers involved in jamming activities is called botnets. Denial of Service attack either injects malicious packet or drops legitimate packets from the network. The objective of DOS attack is to prevent the receiver from reception of legitimate data and to get control over the entire network. This paper proposes a survey on three types of DOS attack such as selective forwarding attack, pollution attack and jamming attack and its detection techniques.
Authors and Affiliations
S. Raja Ratna , R. Ravi, Professor , Dr. Beulah Shekhar
Traffic Estimation in Mobile Ad Hoc Network Using Probe Packets
This paper presents a new method for estimating of traffic in mobile ad hoc by using probe packets. Probing based approaches involves sending test transactions over the network to monitor the path and performance o...
Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique
In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...
BBO Comparison with other Nature Inspired Algorithms to Resolve Mixels
Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed...
Improved PCA Based Face Recognition System
Face Recognition is a computer based application which detects the faces of different persons for authentication and various other purposes. It has separate applications from the fingerprint and iris recognitions....
A Survey on Image Noises and Denoise Techniques
Digital images are noisy due to environmental disturbances. To ensure image quality, image processing of noise reduction is a very important step before analysis or using images. Data sets collected by image sensor...