Abstract

Flood attacks means a network becomes so weighed down with packets, caused by the attackers. It prevents packets being sent/received between the no des in the network. There are many methods adopted to prevent flood attacks in other networks, but non e has been installed successfully for DTN’s. Disrup tion tolerant network is a network, developed in such a manner that intermittent communication problems have very low effect on the outcome of the result. However, due to the limited network resources in th is network such as buffer space and bandwidth, it is l iable to flood attacks. In order to protect resourc es and defend against flood attacks, the rate limiting tec hnique should be adopted. In which each node must be set up with a restriction over the number of packet s it can send to the network and number of duplicat es that can be created for each packets, such as rate limit L and rate limit R respectively. However floo d attacks are caused even in application level result ing in losses of resources such as CPU and sockets. So, technique for detection of application level floods attacks is implemented by verifying DNS query with a specific tool and validating it with mysql database .

Highlights

  • Disruption tolerant network is a valuable network includes mobile nodes which enable to transfer data among nodes

  • Flood attacks are caused even in application level resulting in losses of resources such as CPU and sockets

  • In order to defend flood attacks, rate limiter technique is employed,where assigned each node a restriction for the total packets it can send to the network and number of duplicates it can reverberate for each packet

Read more

Summary

Introduction

Disruption tolerant network is a valuable network includes mobile nodes which enable to transfer data among nodes. The connection among nodes may be held inconsistently or intermittently connected. It is not possible to prevent for attack caused by insiders (authorized). In order to defend flood attacks, rate limiter technique is employed,where assigned each node a restriction for the total packets it can send to the network and number of duplicates it can reverberate for each packet. Two nodes can transfer data when they crosses its rate limits, it will be detected as flood attack

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call