Open Access   Article Go Back

Design of a Novel Technique for Denial of Service Attack Detection in Wireless Network

Sanjeev Kumar1 , Nishant Agnihotri2

  1. Department of Computer Science, Indus International University, Una India.
  2. Department of Computer Science, Indus International University, Una India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 464-468, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.464468

Online published on May 31, 2018

Copyright © Sanjeev Kumar, Nishant Agnihotri . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sanjeev Kumar, Nishant Agnihotri, “Design of a Novel Technique for Denial of Service Attack Detection in Wireless Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.464-468, 2018.

MLA Style Citation: Sanjeev Kumar, Nishant Agnihotri "Design of a Novel Technique for Denial of Service Attack Detection in Wireless Network." International Journal of Computer Sciences and Engineering 6.5 (2018): 464-468.

APA Style Citation: Sanjeev Kumar, Nishant Agnihotri, (2018). Design of a Novel Technique for Denial of Service Attack Detection in Wireless Network. International Journal of Computer Sciences and Engineering, 6(5), 464-468.

BibTex Style Citation:
@article{Kumar_2018,
author = {Sanjeev Kumar, Nishant Agnihotri},
title = {Design of a Novel Technique for Denial of Service Attack Detection in Wireless Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {464-468},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2005},
doi = {https://doi.org/10.26438/ijcse/v6i5.464468}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.464468}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2005
TI - Design of a Novel Technique for Denial of Service Attack Detection in Wireless Network
T2 - International Journal of Computer Sciences and Engineering
AU - Sanjeev Kumar, Nishant Agnihotri
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 464-468
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
561 268 downloads 224 downloads
  
  
           

Abstract

There are the numbers of techniques available in the literature for the detection of denial of service attack but the effective and efficient detection of this attack in the wireless domain remains open challenges. Recently the detection of distributed denial of services attacks is the major problem in the wireless domain. In this paper, a novel technique has been designed for the detection of distributed denial of service attack in wireless networks. The proposed technique was implemented using NS2 simulator.

Key-Words / Index Term

DDoS attack, Ids attack, ad-hoc network attack

References

Kaufman Charlie, Perlman Radia, Speciner Mike. Network Security: Private Commu¬nication in a Public World, 2nd ed., USA, Prentice Hall PTR, 2002.
[2]. J. Levington M. Unlocking the secret of wireless security. In Oen, p. 23 United Kingdom, Wilmington Business Publishing, Sept. 2002.
[3]. J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou, "Distributed defense against DDoS attacks" University of Delaware, CIS Department Technical Report CIS-TR-2005-02, pp. 1-12, 2005.
[4]. A. Challita, M.E. Hassan, S. Maalouf, A. Zouheiry, "A Survey of DDoS Defense Mechanisms", Department of Electrical and Computer Engineering, American University of Beirut, 2004
[5]. M. Robinson, J. Mirkovic, M. Schnaider, S. Michel and P. Reiher. "Challenges and principles of DDoS defense."In ACM SIGCOMM. 2003.
[6]. W. Znaidi, M. Minier, and J.P. Babau, "Detecting wormhole attacks in wireless networks using local neighborhood information." In Proceedings of IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, 2008
[7]. Y. Xu, G. Chen, J. Ford and F. Makedon, "Distributed wormhole attack detection in wireless sensor networks." In Proceedings of the First Annual IFIP Working Group InternationalConference on Critical Infrastructure Protection, 2007.
[8]. K.S. Win, "Analysis of detecting wormhole attack in wireless networks", In World Academy °f Science, Engineering and Technology, pp. 422-428, 2008.
[9]. Y. C. Hu, Y. Chun, A. Perrig, and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks." InIEEETwenty-Second Annual Joint Conference of the Computer and Communications, Vol. 3, pp. 1976-1986, 2003.
[10]. H. Ronghui, M. Guoqing, W. Chunlei and F. Lan, "Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes", World Academy of Science, Engineering and Technology, Vol. 3, 2009.
[11]. R.Z. El Kaissi, A. Kayssi, A. Chehab, and Z. Dawy, "DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks", Ph.D. Dissertation, American University of Beirut, Department of Electrical and Computer Engineering, 2005.
[12]. S. Choi, D.Y.Kim, D.Y. Lee and J. Jung, "WAP: Wormhole attack prevention algorithm in mobile ad-hoc networks." In IEEE International Conference onSensor Networks, Ubiquitous and Trustworthy Computing, pp. 343-
[13]. T.V. Phuong, N.T. Canh, Y.K. Lee, S. Lee and H. Lee, "Transmission time-based mechanism to detect wormhole attacks", In 2nd IEEE Asia-Pacific Service ComputingConference, pp. 172-178, 2007.
[14]. V.S.S. Sriram, A.P. Singh, and G. Sahoo, AZ"Methodology for Securing Wireless LANs against Wormhole Attack", International Journal of Recent Trends in Engineering, Vol. 1, no. 1,2009.
[15]. Network Simulator, http://www.isi.edu/nsnam/ns
[16]. M. Shojaei, N. Movahhedinia, and B.T. Ladani, "DDoS attack detection in IEEE 802.16based networks", Wireless Networks, Vol. 20, Issue 8, pp. 2543-2559, 2014.
[17]. M. GhasemiGol, A. Ghaemi-Bafghi, M. Moghaddam and H. Sadoghi-Yazdi, “Anomaly detection and foresight response strategy for wireless sensor networks", Wireless Networks, Vol. 21, Issue 5, pp. 1425-1442, 2014.
[18] T.V.P. Sundararajan, S. M. Ramesh, R. Maheswar and K. R. Deepak, "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET", Wireless Networks, Vol. 20, Issue 4, pp. 563-578, 2014
[19] G. Koutepas, F. Stamatelopoulos and B. Maglaris, "Distributed management architecture for cooperative detection and reaction to DDoS attacks", Journal of Network and Systems Management, Vol. 12, Issue 1, pp. 73-94, 2004.
[20]. T. Thapngam, S.Yu, W. Zhou and S.K. Makki, "Distributed Denial of Service (DDoS) detection by traffic pattern analysis" Peer-to-Peer Networking and Applications, Vol. 7, Issue 4, pp. 346-358, 2014.
[21]. G. Lee, W. Kim, K. Kim S. Oh and D. Kim, "An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks", Peer-to-Peer Networking and Applications, Vol. 8, Issue 4, pp. 684-693, 2013.
[22]. K. Verma, H. Hasbullah, and A. Kumar, "Prevention of DoS attacks in VANET”, Wireless personal communications, Vol. 73, Issue 1, pp. 95-126, 2013.
[23]. P. Rutravigneshwaran “A Study of Intrusion Detection System using Efficient Data Mining Techniques” Volume-5, Issue-6, pp. 5-8, 2017
[24]. A.Vani “Detection and Elimination of Wormhole Attacks in a MANET Vol.5, Issue.5, pp.35-40, October (2017