2010
DOI: 10.1109/lcomm.2010.101210.101053
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Multicast Video Flooding Attack using the Pattern of Bandwidth Provisioning Efficiency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…The aim of the flooding attack [10] [11], is to exhaust the network resources, such as bandwidth and to consume a node's resources, such as computational and battery power or to disrupt the routing operation to cause severe degradation in network performance. A malicious node can send a large number of RREQs in a short period to a destination node that does not exist in the network.…”
Section: Flooding Attackmentioning
confidence: 99%
“…The aim of the flooding attack [10] [11], is to exhaust the network resources, such as bandwidth and to consume a node's resources, such as computational and battery power or to disrupt the routing operation to cause severe degradation in network performance. A malicious node can send a large number of RREQs in a short period to a destination node that does not exist in the network.…”
Section: Flooding Attackmentioning
confidence: 99%
“…A common defense (used by SNEP) is to include a monotonically increasing counter with every message and to not accept messages with old counter values. A. Gosal et al (2010) have shown that the average data freshness in the presence of 25 malicious nodes is near 96%, whereas its values are 88% and 81% for 50 and 100 malicious nodes respectively. The results show that data freshness is inversely related to the number of malicious nodes present in the network.…”
Section: Requirements For Secure Sensor Network Protocols Data Freshnessmentioning
confidence: 99%
“…Amid the existing findings, there are highlighted DDoS attack schemes , such as user datagram protocol (UDP) flood by sending UDP packets with spoofed return addresses and continuously generating characters to the victims who respond the requests; synchronize flood attacks that damage the famous three‐way handshake agreement in transmission control protocol communication networks; and Smurf attack that is simple enough for untrained intruders to flood malicious Internet Control Message Protocol messages to overwhelmed victim's systems.…”
Section: Introductionmentioning
confidence: 99%