Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks

The extensive applications of Mobile ad hoc networks are in civilian and military. In the MANETs nodes are joining to any point and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In our paper, we are trying to solve the problem regarding attacks by black-hole in the group of nodes. We are dealing with the identifications of multiple black holes and a remedy to generate another route avoiding black-hole attacked nodes. We are also trying to deliver security to avoid DDOS attack.

[1]  Steven M. Bellovin,et al.  ICMP Traceback Messages , 2003 .

[2]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[3]  Steve M. Bellovin,et al.  ICMP Traceback Message , 2003 .

[4]  Stuart Harvey Rubin,et al.  Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[5]  Van Jacobson,et al.  Link-sharing and resource management models for packet networks , 1995, TNET.

[6]  QUTdN QeO,et al.  Random early detection gateways for congestion avoidance , 1993, TNET.

[7]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[8]  Linda Pesante,et al.  CERT® Coordination Center , 2002 .