Crytography Bases Solution FOR Distributed Denial of Service Attack in Manet

In mobile ad-hoc network nodes communicate with each other or forward data by making route with the help of other nodes. Infrastructure of the network does not fix topology change due to movability of nodes that’s why attacking condition in this network become high. There are lots of attacks for this network. In this paper we study about denial of service attack and its prevention and detection technique, in our propose work we give a novel solution to detect or prevent denial of service attack we implement our work in NS-2.35. Efficiency of our work we proof with the help of results.

[1]  Ramratan Ahirwal,et al.  Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network , 2012 .

[2]  Yinghua Guo,et al.  Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks , 2010, 2010 Fourth International Conference on Network and System Security.

[3]  Jörg Widmer,et al.  A hierarchical approach to position-based multicast for mobile ad-hoc networks , 2007, Wirel. Networks.

[4]  Abdulmotaleb El-Saddik,et al.  Detecting and Preventing IP-spoofed Distributed DoS Attacks , 2008, Int. J. Netw. Secur..

[5]  Mun Choon Chan,et al.  On the effectiveness of DDoS attacks on statistical filtering , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[7]  Brij B. Gupta,et al.  An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET) , 2014 .

[8]  Wanlei Zhou,et al.  Discriminating DDoS Flows from Flash Crowds Using Information Distance , 2009, 2009 Third International Conference on Network and System Security.

[9]  Abdulmotaleb El-Saddik,et al.  Detecting Distributed Denial of Service Attack Traffic at the Agent Machines , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[10]  Ruby B. Lee,et al.  Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures , 2004, PDCS.

[11]  Weijia Jia,et al.  Efficient construction of connected dominating set in wireless ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[12]  A. Piskozub Denial of service and distributed denial of service attacks , 2002, Modern Problems of Radio Engineering, Telecommunications and Computer Science (IEEE Cat. No.02EX542).

[13]  M. RameyaJProf.ThanujaR..SomaSundaram A Trusted Approach Towards DDos Attack , 2015 .