Abstract

The wireless ad hoc network is particularly vulnerable to DOS attacks due to its features of open medium, dynamic changing topology, cooperative algorithms, decentralization of the protocols, and lack of a clear line of defense is a growing problem in networks today. In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DOS) are possible because of the inherent limitations of its routing protocols. In this paper we will secure the MANET from the DDOS attack. DDOS attacks are similar to DOS attacks but there is a difference between them and that is DDOS attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. Very often, systems that use for attack is a part of the networks and users of these systems don’t know about that, their systems used for attack to another systems. This kind of attack, consume more bandwidth and uses more sources in network. . In this work, we study the effect of one of the important attacks that called DDOS in MANET on most vulnerability protocol that named AODV. The product of this study is detection of DDOS attack by using AODV (adhoc on demand distance vector) protocol. Proposed scheme is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well.

Highlights

  • A wireless ad hoc network is a decentralized wireless network where the network does not depend on a preexisting infrastructure, such as routers in wired networks or access points (AP) in managed wireless networks

  • There is one attack to be considered on Mobile Ad hoc Networks (MANET) is Distributed DOS (DDOS) attack

  • This work introduces an approach based on immune networks to analyze the network traffic, which focuses on the intrusion detection process for Denial of Service Attacks (DOS) flooding attacks

Read more

Summary

Introduction

A wireless ad hoc network is a decentralized wireless network where the network does not depend on a preexisting infrastructure, such as routers in wired networks or access points (AP) in managed (infrastructure) wireless networks. There is one attack to be considered on MANET is DDOS attack This attack is a natural development from the SYN Flood Attack, The idea behind this attack is focusing Internet connection bandwidth of many machines upon one or a few machines. The assailant installs his remote attack program on weakly protected computers (Universities, home users constantly connected etc.) using Trojan horses and intrusion methods, and orchestrates the attack from all the different computers at once. This creates a brute force flood of malicious "nonsense" Internet traffic to swamp and consume the target server's or its network connection bandwidth. The product of this study is detection of DDOS attack by using AODV (adhoc on demand distance vector) protocol [1]

Related Works
Objective and Research Methodology
Detection system location
Network detection
Detection Parameters
Load and Traffic Monitoring
Latency to Victim
Simulation of DDOS Attack
Adhoc On Demand Distance Vector Protocol
Algorithm Parameters
Experimental Results
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call