Detection and Control of DDOS Attacks over Reputation and Score Based MANET

MANET is quickly spreading for the property of its capability in forming rapidly changing topologies network without the aid of any established infrastructure or centralized administration. The security challenges in MANET have become a primary concern to provide secure communication. The Attacks on MANET disrupts network performance and reliability. The DOS (denial-of-service), Distributed denial-of-service (DDoS) attacks are a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. These attacks lead toward the degradation or prevention of legitimate use of network resources. There is a need to provide an incentive or credit based mechanism that can provide cooperation among nodes in the network and improve overall network performance and functionality by prevention, detection and control of DOS and DDOS attacks. Therefore, in this paper, we proposed the detection and control mechanism for DDOS attacks over reputation and score based MANET and a clustering technique uses the reputation and score value of nodes.

[1]  Ivan Stojmenovic,et al.  Ad hoc networks security , 2004 .

[2]  Ranvijay,et al.  A REVIEW PAPER ON AD HOC NETWORK SECURITY , 2007 .

[3]  Gurjinder Kaur,et al.  Distributed Denial of Service Attacks in Mobile Adhoc Networks , 2011 .

[4]  Anup Kumar,et al.  A framework for integrated Internet and ad hoc network security , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[5]  S. Muftic,et al.  Security Architecture for Open Distributed Systems , 1993 .

[6]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[7]  Ali Ghaffari,et al.  Vulnerability and security of mobile ad hoc networks , 2006 .

[8]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  George Kesidis,et al.  Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.

[10]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[11]  SLID: A secure lowest-ID clustering algorithm , 2008, Wuhan University Journal of Natural Sciences.

[12]  Jung-Min Park,et al.  A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[13]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.

[14]  J. Redi,et al.  A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.

[15]  Mieso K. Denko A Localized Architecture for Detecting Denial of Service (DoS) Attacks in Wireless AD Hoc Networks , 2005, INTELLCOMM.

[16]  Sven Dietrich,et al.  Analyzing Distributed Denial of Service Tools: The Shaft Case , 2000, LISA.

[17]  R. Power CSI/FBI computer crime and security survey , 2001 .

[18]  William Cheswick,et al.  Firewalls and Internet Security , 1994 .

[19]  Yuebin Bai,et al.  Intrusion Detection Systems: technology and development , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..

[20]  Robin Kravets,et al.  Composite key management for ad hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[21]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[22]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[23]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[24]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[25]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[26]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[27]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[28]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[29]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.