Flood attacks means a network becomes so weighed down with packets, caused by the attackers. It prevents packets being sent/received between the no des in the network. There are many methods adopted to prevent flood attacks in other networks, but non e has been installed successfully for DTN’s. Disrup tion tolerant network is a network, developed in such a manner that intermittent communication problems have very low effect on the outcome of the result. However, due to the limited network resources in th is network such as buffer space and bandwidth, it is l iable to flood attacks. In order to protect resourc es and defend against flood attacks, the rate limiting tec hnique should be adopted. In which each node must be set up with a restriction over the number of packet s it can send to the network and number of duplicat es that can be created for each packets, such as rate limit L and rate limit R respectively. However floo d attacks are caused even in application level result ing in losses of resources such as CPU and sockets. So, technique for detection of application level floods attacks is implemented by verifying DNS query with a specific tool and validating it with mysql database .
[1]
Adrian Perrig,et al.
Distributed detection of node replication attacks in sensor networks
,
2005,
2005 IEEE Symposium on Security and Privacy (S&P'05).
[2]
Jie Wu,et al.
Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets
,
2009,
IEEE INFOCOM 2009.
[3]
Kevin R. Fall,et al.
A delay-tolerant network architecture for challenged internets
,
2003,
SIGCOMM '03.
[4]
Sriram Ramabhadran,et al.
Cloud control with distributed rate limiting
,
2007,
SIGCOMM '07.
[5]
Qinghua Li,et al.
Mitigating Routing Misbehavior in Disruption Tolerant Networks
,
2012,
IEEE Transactions on Information Forensics and Security.
[6]
Brian Gallagher,et al.
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks
,
2006,
Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.