Mitigating Denial of Service Attacks in Wireless Networks

Abstract

The open nature of the wireless media becomes a root cause for denial of service attack. Denial of Service (DOS) can be different types and disrupt multiple layers. The idea here is to prevent the cyberspace from DOS attack. Zombie is a computer that has been compromised by the hackers for performing malicious activities. Group of zombie computers involved in jamming activities is called botnets. Denial of Service attack either injects malicious packet or drops legitimate packets from the network. The objective of DOS attack is to prevent the receiver from reception of legitimate data and to get control over the entire network. This paper proposes a survey on three types of DOS attack such as selective forwarding attack, pollution attack and jamming attack and its detection techniques.

Authors and Affiliations

S. Raja Ratna , R. Ravi, Professor , Dr. Beulah Shekhar

Keywords

Related Articles

Traffic Estimation in Mobile Ad Hoc Network Using Probe Packets 

This paper presents a new method for estimating of traffic in mobile ad hoc by using probe packets. Probing based approaches involves sending test transactions over the network to monitor the path and performance o...

Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique

In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...

BBO Comparison with other Nature Inspired Algorithms to Resolve Mixels  

Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed...

Improved PCA Based Face Recognition System 

Face Recognition is a computer based application which detects the faces of different persons for authentication and various other purposes. It has separate applications from the fingerprint and iris recognitions....

A Survey on Image Noises and Denoise Techniques 

Digital images are noisy due to environmental disturbances. To ensure image quality, image processing of noise reduction is a very important step before analysis or using images. Data sets collected by image sensor...

Download PDF file
  • EP ID EP104300
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

S. Raja Ratna, R. Ravi, Professor, Dr. Beulah Shekhar (2013). Mitigating Denial of Service Attacks in Wireless Networks. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1716-1719. https://europub.co.uk/articles/-A-104300