CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Interference Detection and Prevention of Black Hole (Dos) Attack Using Honeypots

Published on October 2014 by Rahul Diwate, Surabhi Deshpande, Shaktikala
International Conference on Quality Up-gradation in Engineering, Science and Technology
Foundation of Computer Science USA
ICQUEST - Number 1
October 2014
Authors: Rahul Diwate, Surabhi Deshpande, Shaktikala
bf36c98d-904b-4329-87d2-e3b25b4ea9da

Rahul Diwate, Surabhi Deshpande, Shaktikala . Interference Detection and Prevention of Black Hole (Dos) Attack Using Honeypots. International Conference on Quality Up-gradation in Engineering, Science and Technology. ICQUEST, 1 (October 2014), 9-12.

@article{
author = { Rahul Diwate, Surabhi Deshpande, Shaktikala },
title = { Interference Detection and Prevention of Black Hole (Dos) Attack Using Honeypots },
journal = { International Conference on Quality Up-gradation in Engineering, Science and Technology },
issue_date = { October 2014 },
volume = { ICQUEST },
number = { 1 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 9-12 },
numpages = 4,
url = { /proceedings/icquest/number1/18684-1516/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Quality Up-gradation in Engineering, Science and Technology
%A Rahul Diwate
%A Surabhi Deshpande
%A Shaktikala
%T Interference Detection and Prevention of Black Hole (Dos) Attack Using Honeypots
%J International Conference on Quality Up-gradation in Engineering, Science and Technology
%@ 0975-8887
%V ICQUEST
%N 1
%P 9-12
%D 2014
%I International Journal of Computer Applications
Abstract

Due to rapid increase in networking throughput and security threat, much research is been done in the field of computer science. But security susceptibility grows every day. DoS attacks are the most prominent threat to the networks around the world. This paper gives an introduction to various DoS attacks present in today's Ad Hoc networks and proposes a method to prevent or counter these attacks against the networks by using honeypots that are deployed into the network to mislead and trap the attacker and thus providing a two layer security to the Ad Hoc networks. Computer networks and information technology on in the wake of intensive growth of use of the whole, we now rely deeply on our network for even the most basic functions. Even a small hindrance to the network just about paralyses us. But there are severe threats looming around, like Blackhole attack Rushing attack Wormhole attack and many more known and unknown attacks. These attack affect the network unfavorably thus creating a chaos all around. Thus NETWORK SECUTIRY has become the priority of all organizations. Many security measures have been taken to counter the security attacks. But these measures are not up to the mark. In this paper we are going to give a detail review about Networks and all the types of know DoS (Denial of service) present in the system. We also propose how a new methodology to counter these attack by providing a two layer security to the network by the use of HONEYPOTS. These honeypots help them to mislead the attacker to itself, exposes itself to the attack and gathers the information about the attacker, the type of attack and the purpose of the attack. Thus the gathered information helps us to counter the given type of attack.

References
  1. Hu, Y. -C. , Perrig, A. A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine. v. 02, n. 3, (May–Jun. 2004), pp. 28–39
  2. Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine general's problem. ACM Transactions on Programming Languages and Systems, 4(3):382–401, 1982.
  3. Sr?an ?apkun, Jean-Pierre Hubaux, and Markus Jacobsson. Secure and privacy-preserving communication in hybrid ad hoc networks. Technical Report IC/2004/10, Swiss Federal Institute of Technology Lausanne (EPFL), Lausanne, Switzerland and RSA Laboratories, Bedford, MA, USA, 2004.
  4. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th Annual ACM International Conference on Mobile Computing and Networking (MobiCom '02), September 2002.
  5. Security in ad hoc networks: basic mechanismshttp://perso. crans. org/raffo/papers/phdthesis/thesisch4. html
  6. Honeypot (computing)http://en. wikipedia. org/wiki/Honeypot_(computing)
Index Terms

Computer Science
Information Sciences

Keywords

Adhoc Wireless Network Dos Honeypot Jamming. 802. 11 Network Security.