CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's

by Deepak Vishwakarma, Anil Khandekar, Nitin Rathore, Ranjeet Osari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 15
Year of Publication: 2015
Authors: Deepak Vishwakarma, Anil Khandekar, Nitin Rathore, Ranjeet Osari
10.5120/20628-3214

Deepak Vishwakarma, Anil Khandekar, Nitin Rathore, Ranjeet Osari . Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's. International Journal of Computer Applications. 117, 15 ( May 2015), 5-10. DOI=10.5120/20628-3214

@article{ 10.5120/20628-3214,
author = { Deepak Vishwakarma, Anil Khandekar, Nitin Rathore, Ranjeet Osari },
title = { Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 15 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number15/20628-3214/ },
doi = { 10.5120/20628-3214 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:27.948445+05:30
%A Deepak Vishwakarma
%A Anil Khandekar
%A Nitin Rathore
%A Ranjeet Osari
%T Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 15
%P 5-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad hoc network (MANET) is a group of nodes or devices without any fixed infrastructure or centralized control. There will be no centralized control (like switch router etc. ) or network infrastructure for a MANET to be set up, thus making its deployment very quick and inexpensive. In mobile ad-hoc network, the intermediate nodes or devices play role of router which routed the packets to the terminal node . The nodes ability to changes its location freely ensures a flexible and versatile non-static network topology which is another important function of a mobile ad-hoc network. Some of the ad-hoc applications cover emergency disaster relief, military operations over a battlefield (vulnerable infrastructure), and wilderness expeditions (transient networks), and community networking through health monitoring using medical sensor network (MSN). The security challenges in mobile ad-hoc networks have become a key concern to provide secure and reliable communication. The Attacks on mobile ad-hoc networks minimizes network reliability and performance. The DOS (denial-of-service), Distributed denial-of-service (DDoS) attacks are very quickly growing problem. The variety and multitude of both the attacks and the defence approaches is overwhelming. These attacks affected network resources, denying of service for valid node and degrades performance of network. In this paper, distributed denial of service attacks (DDoS) is presented which are attacked on mobile ad-hoc network and advised approach to detect DDoS attack and provide valid solutions to maximize network performance and resources through comparison of different network parameters.

References
  1. S. A. Arunmozhi, Y. Venkataramani, "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks", International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 3, May 2011.
  2. Mieso K. Denko, "Detection and Prevention of Denial of Service (DoS) Attacks in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme", SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3, NUMBER 4.
  3. Rizwan Khan, A. K. Vatsa, " Detection and Control of DDOS Attacks over Reputation and Score Based MANET ", Journal of Emerging Trends in Computing and Information Sciences VOL. 2, NO. 11, October 2011.
  4. L. Buttyan and J. Hubaux, "Stimulating cooperation in self- organizing mobile ad hoc networks", ACM/Kluwer Mobile Networks and Applications (MONET), 2003.
  5. M. Baker, E. Fratkin, D. Guitierrez, T. Li, Y. Liu and V. Vijayaraghavan, "Participation incentives for ad hoc networks", 2001.
  6. D. Barreto, Y. Liu, J. Pan and F. Wang, "Reputation-based participation enforcement for adhoc networks", 2002.
  7. S. Zhong, J. Chen and Y. R. Yang, "Sprite: A simple, cheat- proof, credit-based system for mobile ad-hoc networks," Technical Report 1235, Department of Computer Science, Yale University ,2002.
  8. S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," In: Mobile Computing and Networking, 2000.
  9. S. Buchegger and J. Y. L Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes — Fairness In Distributed Ad-hoc NeTworks," In Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, IEEE, 2002.
  10. P. Michiardi and R. Molva, "Making greed work in mobile ad hoc networks," Technical report, Institut Eur ?ecom , 2002.
  11. Xiapu Luo, Edmond W. W. Chan,Rocky K. C. Chang: Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals, EURASIP Journal on Advances in Signal Processing , 2009.
  12. Wei-Shen Lai, Chu-Hsing Lin , Jung-Chun Liu , Hsun-Chi Huang, Tsung-Che Yang: Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks, International Journal of Software Engineering and Its Applications, Vol. 2, No. 4, pp. 61-72 , 2008.
  13. Xiaoxin Wu, David,K. Y. Yau, Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach, in Proceedings of the 2nd ACM symposium on Information, computer and communication security, pp 365-367, 2006.
  14. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks, ACM, Newyork,USA, 2004.
  15. Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong: A New Routing Attack in Mobile Ad Hoc Networks, International Journal of Information Technology, Vol. 11, No. 2 , 2005.
  16. Vikram Gupta, Srikanth Krishnamurthy and Michalis Faloutsos, Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks, National Science Foundation under Grant No. 9985195, DARPA award N660001-00-18936 Riverside CA, MILCOM-Network Security, Anaheim, October 2002.
  17. Perkins, C. ; Belding-Royer, E. ; Das, S. Adhoc on- Demand Distance Vector (AODV) Routing", July 2003.
  18. Network Simulator- ns-2. http://www. isi. edu/ nsnam /ns/.
  19. Deepak Vishwakarma, D. S. Rao, 'Detection mechanism for distributed denial of service (DDoS) attack in Mobile Ad-hoc networks", Volume-102, September 2014.
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Attacks DoS Distributed DoS.