2011
DOI: 10.5121/ijnsa.2011.3312
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack and Defense Scheme in Wireless Ad hoc Networks

Abstract: Abstract.The

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…ripple detection maps the series of the flow rates into a spectral domain. Since the attack flows and therefore the legitimate flows have distinguishable frequency parts, the presence of attack flows may be detected [12]. However, most of the change-point primarily based and wavelet-based detections solely specialize in police investigation the abrupt changes of the traffic rate, so that they could also be depleted for police investigation association requests flooding, like SYN flooding, since the traffic rate might not increase most in such attacks.…”
Section: Ddos Detectionmentioning
confidence: 99%
“…ripple detection maps the series of the flow rates into a spectral domain. Since the attack flows and therefore the legitimate flows have distinguishable frequency parts, the presence of attack flows may be detected [12]. However, most of the change-point primarily based and wavelet-based detections solely specialize in police investigation the abrupt changes of the traffic rate, so that they could also be depleted for police investigation association requests flooding, like SYN flooding, since the traffic rate might not increase most in such attacks.…”
Section: Ddos Detectionmentioning
confidence: 99%
“…A. Arunmozhi [2011] et al In this paper, mentioned the DDOS attacks and proposed a safeguard scheme to strengthen the performance of the ad hoc networks. Our proposed security mechanism uses the MAC layer understanding to realize the attackers.…”
Section: Literature Surveymentioning
confidence: 99%
“…Xiaoxin Wu et al [7] proposed a DoS mitigation technique that uses digital signatures to verify legitimate packets, and drop packets that do not pass the verification Ping. S.A.Arunmozhi and Y.Venkataramani [8] proposed a defense scheme for DDoS attack in which they use MAC layer information like frequency of RTD/CTS packet, sensing a busy channel and number of RTS/DATA retransmission. Jae-Hyun Jun, Hyunju Oh, and Sung-Ho Kim [9] proposed DDoS flooding attack detection through a step-by-step investigation scheme in which they use entropy-based detection mechanism against DDoS attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic.…”
Section: Related Workmentioning
confidence: 99%