CFP last date
20 May 2024
Reseach Article

Article:A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET

by S.Venkatasubramanian, N.P.Gopalan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 1
Year of Publication: 2011
Authors: S.Venkatasubramanian, N.P.Gopalan
10.5120/2477-3333

S.Venkatasubramanian, N.P.Gopalan . Article:A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET. International Journal of Computer Applications. 21, 1 ( May 2011), 7-11. DOI=10.5120/2477-3333

@article{ 10.5120/2477-3333,
author = { S.Venkatasubramanian, N.P.Gopalan },
title = { Article:A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 1 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number1/2477-3333/ },
doi = { 10.5120/2477-3333 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:22.782661+05:30
%A S.Venkatasubramanian
%A N.P.Gopalan
%T Article:A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 1
%P 7-11
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Reduction of Quality (ROQ) attack is one of the Denial of Service (DoS) attacks which affect the MANETs. Instead of refusing the clients from the services completely, these RoQ attacks throttle the TCP throughput heavily and reduce the QoS to end systems. To mitigate this RoQ attack in MANET, we propose to design a distributed defense technique in this paper. Initially, a mechanism for monitor node selection is designed such that the monitoring nodes should cover the entire network. These monitoring nodes estimate the short-lived flows to observe the sudden increase in the traffic load in a short time. When the total traffic load of such flow exceeds a threshold value, an attack is detected and the corresponding node is added into a local blacklist. The local blacklist from all the monitoring nodes is sent to a master node from which it evaluates the attacker. The attacker will be notified by the master node to all the monitoring nodes so that all the nodes become aware of the attacker. By simulation results, we show that the proposed technique improves the throughput with reduced packet drops.

References
  1. Yuh-Shyan Chen, Shin-Jr Jan and Ming-Chin Chuang, “A Shoelace-Based QoS Routing Protocol for Mobile Ad Hoc Networks Using Directional Antenna”, Wireless Personal Communications, SpringerLink, 2009.
  2. A.N. Al-Khwildi, S. Khan, K.K. Loo and H.S. Al-Raweshidy, “Adaptive Link-Weight Routing Protocol using Cross-Layer Communication for MANET”, WSEAS Transactions on Communications, 2007.
  3. Gahng-Seop Ahn, Andrew T. Campbell, Andras Veres and Li-Hsiang Sun, “Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad Hoc Networks (SWAN)”, IEEE Transactions on Mobile Computing, 2002.
  4. S.Venkatasubramanian and N.P.Gopalan “A QoS Architecture for Resource Provisioning and Rate Control in Mobile Adhoc Networks” published in International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.3, September 2010, pp 106- 120
  5. Wei Ren, Dit-Yan Yeung, Hai Jin, and Mei Yang “Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks” International Journal of Network Security, Vol.4, No.2, PP.227-234, Mar. 2007.
  6. Yang Xiang, Wanlei Zhou and Morshed Chowdhury “A Survey of Active and Passive Defence Mechanisms against DDoS Attacks” 2004.
  7. Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, and Roshan K. Thomas “Design and Analysis of a Denial-of-Service-Resistant Quality-of-Service Signaling Protocol for MANETs” IEEE transactions on vehicular technology, VOL. 55, NO. 3, MAY 2006.
  8. Jatinder Singh, Dr. Savita Gupta, and Dr. Lakhwinder Kaur “A MAC Layer Based Defense Architecture for Reduction-of-Quality (RoQ) Attacks in Wireless LAN” International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010.
  9. Zhu Lina, and Zhu Dongzhao “A Router-based Technique to Detect and Defend against Low-rate Denial of Service” 2009 International Symposium on Web Information Systems and Applications.
  10. Yu Chen and Kai Hwang “TCP Flow Analysis for Defense against Shrew DDoS Attacks” IEEE International Conference on Communications (ICC 2007).
  11. P. Varalakshmi, S.Thamarai Selvi, S. Monica and G. Akilesh “Securing Trustworthy Three-tier Grid Architecture with DDoS Attack Defense Mechanism” IC3–2008.
  12. Dhanant Subhadrabandhu, Saswati Sarkar, and Farooq Anjum “A Framework for Misuse Detection in Ad Hoc Networks—Part I” 2006 IEEE.
  13. Chetan N. Mathur and K. P. Subbalakshmi “Digital Signatures for Centralized DSA Networks” IEEE 2007.
  14. Network Simulator, http://www.isi.edu/nsnam/ns
Index Terms

Computer Science
Information Sciences

Keywords

DDT RoQ MANET DoS short-lived flows