2010
DOI: 10.1080/19393555.2010.514651
|View full text |Cite
|
Sign up to set email alerts
|

A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks

Abstract: Reduction-of-Quality (RoQ) attack is a type of Distributed Denial-of-Service (DDoS) attack that is difficult to detect in current computing systems and networks. These RoQ attacks throttle the throughput heavily and reduce the Quality of Service (QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we propose to develop a flow monitoring scheme to defend against such attacks in mobile Ad-hoc networks. Our proposed defense mechanism consists of a flow monit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 10 publications
(4 reference statements)
0
6
0
Order By: Relevance
“…To stop RoQ attacks on MANETs, Arunmozhi and Venkataramani in [82] have proposed a flow monitoring (FMON) scheme that employs a MAC layer-based detection scheme based on the frequency and retransmission of RTS/CTS and data, as well as a response based on ECN marking. The performance of FMON has been compared to SWAN and SPA-ARA protocols.…”
Section: Previous Methods For Detection Of Roq Attacksmentioning
confidence: 99%
“…To stop RoQ attacks on MANETs, Arunmozhi and Venkataramani in [82] have proposed a flow monitoring (FMON) scheme that employs a MAC layer-based detection scheme based on the frequency and retransmission of RTS/CTS and data, as well as a response based on ECN marking. The performance of FMON has been compared to SWAN and SPA-ARA protocols.…”
Section: Previous Methods For Detection Of Roq Attacksmentioning
confidence: 99%
“…This attack has the aim of reducing service quality to legitimate users. The attacker throttles the network traffic in order to end systems, transmitting high-rate bursts on longer timescales, and flooding the border router queue on which most legitimate user packets are dropped [40]- [43]. The attack target, which in this case can be any transport layer protocol, is what differentiates the Shrew from the RoQ attacks.…”
Section: ) Roq Attackmentioning
confidence: 99%
“…The attacking node at first agrees to forward data packet or messages then fails to do so and starts behaving like a malicious node 8 . At first the attacker node behaves normally and replies true route replies(RREP) messages to other nodes to invoke route request (RREQ) messages and accepts or takes the sending packets and finally drops few or all packets to launch denial of service (DoS) attack 9 . If nodes in the neighborhood try to send data packets over attacking or victim nodes lose connection to target or destination node or network and may want to discover or rebuild a route again by broadcasting route request (RREQ) messages.…”
Section: Packet Drop Attack (Gray Hole)mentioning
confidence: 99%
“…Node 5 cybercasts a RREQ (route request) packet to all its 1-Hop nodes i.e. 4,6,7,8,9 and request for a route to cooperative node Node-6. After receiving a route reply (RREP) from suspected node 4, node 5 sends an enquiry packet to the node 6 via node 4 and confirms from node6 about probe packet.…”
Section: Local Anomaly Detection (Lad)mentioning
confidence: 99%