Open Access   Article Go Back

Distributed Denial of Service Attack Detection Techniques for Mobile Ad Hoc Networks

A. Chaudhary1 , G. Shrimal2 , R. Rautela3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 907-914, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.907914

Online published on Aug 31, 2018

Copyright © A. Chaudhary, G. Shrimal, R. Rautela . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Chaudhary, G. Shrimal, R. Rautela, “Distributed Denial of Service Attack Detection Techniques for Mobile Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.907-914, 2018.

MLA Style Citation: A. Chaudhary, G. Shrimal, R. Rautela "Distributed Denial of Service Attack Detection Techniques for Mobile Ad Hoc Networks." International Journal of Computer Sciences and Engineering 6.8 (2018): 907-914.

APA Style Citation: A. Chaudhary, G. Shrimal, R. Rautela, (2018). Distributed Denial of Service Attack Detection Techniques for Mobile Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 6(8), 907-914.

BibTex Style Citation:
@article{Chaudhary_2018,
author = {A. Chaudhary, G. Shrimal, R. Rautela},
title = {Distributed Denial of Service Attack Detection Techniques for Mobile Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {907-914},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2794},
doi = {https://doi.org/10.26438/ijcse/v6i8.907914}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.907914}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2794
TI - Distributed Denial of Service Attack Detection Techniques for Mobile Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - A. Chaudhary, G. Shrimal, R. Rautela
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 907-914
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
609 424 downloads 244 downloads
  
  
           

Abstract

Nowadays, Mobile ad hoc networks are very attractive in terms of its flexibility because there is no need of predefined infrastructure for communication such as wired network. This flexibility makes mobile ad hoc network more vulnerable to threats. Threats compromise with the attributes of security so reason being threats can be decreased the survivability or performance of the mobile ad hoc networks. Several types of attacks in MANETs have been reviewed in the literature, the most popular attack is Distributed Denial of Services Attack (DDoS) because the aim of DDoS is to restrict the MANETs to provide the normal services to their intended users by consuming bandwidth or overload the resources. This paper focuses on the several detection techniques of DDoS attack and proposed a new technique based on genetic algorithm for the detection of DDoS attack on MANETs.

Key-Words / Index Term

Mobile Ad hoc Networks (MANETs), DDoS, Intrusion Detection System (IDS), Detection Techniques

References

[1] IETF Mobile Ad-Hoc Networks Working Group (MANET), IETF web-site www.ietf.org/dyn/wg/charter/manet-charter.html
[2] IETF Ad-Hoc Networks Autoconfigurations (autoconf) Working Group, IETF website http://datatracker.ietf.org/wg/autoconf/charter/
[3] IEEE Std 802.11-2007, “IEEE standard for information technology-Telecommunication and information exchange between systems- Local and metropolitan area network-Specific requirement, Part 11 Wireless LAN medium access control and physical layer specifications”, June 2007.
[4] Chaudhary, Alka, V. N. Tiwari, and Anil Kumar. "A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in manets", International Journal of Network Security 18, no. 3, 514-522, 2016.
[5] Chaudhary, A., V. N. Tiwari, and A. Kumar. "Analysis of fuzzy logic based intrusion detection systems in mobile ad hoc networks", BVICA M`s International Journal of Information Technology 6.1, 2014.
[6] Chaudhary, Alka. "Neuro-fuzzy based intrusion detection systems for network security", Journal of Global Research in Computer Science 5.1, pp. 1-2, 2014.
[7] Farooqui, Yassir, Vanita Mane, and Puja Padiya. "DDOS using Intrusion Detection System in Wireless Mobile Ad hoc Network”.
[8] Yi, Ping, et al. "A new routing attack in mobile ad hoc networks", International Journal of Information Technology 11.2, pp. 83-94,2005.
[9] Arunmozhi, S. A., and Y. Venkataramani. "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks", arXiv preprint arXiv: pp.1106.1287,2011.
[11] Ahamad, Tariq, and Abdullah Aljumah. "Detection and defense mechanism against DDoS in MANET", Indian Journal of Science and Technology 8.33, 2015.
[10] Timcenko, V. V. "An approach for DDoS attack prevention in mobile ad hoc networks", Elektronika Ir Elektrotechnika 20, no. 6 pp.150-153, 2014.
[12] Huang, Qiang, Hisashi Kobayashi, and Bede Liu. "Modeling of distributed denial of service attacks in wireless networks", Communications, Computers and signal Processing, 2003. PACRIM. 2003 IEEE Pacific Rim Conference on. Vol. 1. IEEE, 2003.
[13] Aljumah, Abdullah. "detecting distributed denial of service (ddos) attack using ttl constraint in mobile adhoc networks (manet)", Science International 27.6,2015.
[14] Sharma, Prajeet, Niresh Sharma, and Rajdeep Singh. "A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network", International Journal of Computer Applications 41.21 2012.
[15] Thyagarajan, Karthikeyan, and Arunkumar Thangavelu. "An Integrated Defense Approach for Distributed Denial of Service Attacks In Mobile Ad-Hoc Network", International Journal of Applied Engineering Research 11.7, pp. 4898-4910,2016.
[16] Sharma, Neeraj, B. L. Raina, Prabha Rani, Yogesh Chaba, and Yudhvir Singh. "Attack Prevention Method Methods for DDOS Attack in MANET", Asian Journal Of Computer Science And Information Technology1 1, pp.18-21, 2010.
[17] Denko, Mieso K. "Detection and prevention of Denial of Service (DoS) attacks in mobile ad hoc networks using reputation-based incentive scheme", Journal of Systemics, Cybernetics and Informatics 3.4, pp. 1-9, 2005.
[18] Kumar, Mukesh, and Naresh Kumar. "DETECTION AND PREVENTION OF DDOS ATTACK IN MANET`S USING DISABLE IP BROADCAST TECHNIQUE", International Journal of Application or Innovation in Engineering & Management 2.7, pp. 29-36, 2013.
[19] Vishwakarma, Deepak, and D. S. Rao. "Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks", International Journal of Computer Applications 102.9, pp. 23-26, 2014.
[20] Kumari, Ranjana, and Achint Chugh. "Distributed Denial of Service Attack Detection, Prevention and Secure Communication in MANET",
[21] Timcenko, V. A. L. E. N. T. I. N. A., and Mirjana Stojanovic. "Application of forensic analysis for intrusion detection against DDoS attacks in mobile ad hoc networks", Proceedings of the 1st WSEAS Int. Conf. on Information Technology and Computer Networks (ITCN`12), Vienna. 2012.
[22] Nadeem, Adnan, and Michael Howarth. "Adaptive intrusion detection & prevention of denial of service attacks in MANETs", Proceedings of the 2009 international conference on wireless communications and mobile computing: Connecting the world wirelessly. ACM, 2009.
[23] Mitrokotsa, Aikaterini, Rosa Mavropodi, and Christos Douligeris. "Intrusion detection of packet dropping attacks in mobile ad hoc networks," Proceedings of the International Conference on Intelligent Systems And Computing: Theory And Applications. 2006.
[24] Chhabra, Meghna, Brij Gupta, and Ammar Almomani. "A novel solution to handle DDOS attack in MANET", Journal of Information Security 4.03, 2013.
[25] Sharma, Prajeet, Niresh Sharma, and Rajdeep Singh. "A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network", International Journal of Computer Applications 41.21 2012.
[26] Patidar, V., & Kumbhkar, M., “Analysis of Cloud Computing Security Issues in Software as a Service”, International Journal of Scientific Research in Computer Science and Engineering, 2(3), pp. 1-5, 2014.