This paper discusses an improved mechanism to
mitigate the DDoS attack in Mobile Ad-hoc Network (MANET)
without compromising the packet delivery ratio. MANET
inherently has geographically sparse mobile nodes more
vulnerable to various attackers more radically the DDoS type.
Moreover it emanates open medium, absence of centralized
authority, lack of clear line of defense that leads to more
vulnerability towards secure environment. Since there are no
hindrances for non-legitimate nodes, which allows them to freely
enter and exit from the network at anytime, various active attacks
like black hole, gray hole, DDoS found to jeopardize the network.
The DDoS attack discussed predominantly in to present paper,
penetrates the network thereby constraining the resources like
memory, battery and bandwidth by frequently transmitting fake
packets after regular time span thereby starving the computing
resources. This paper demonstrates the feasibility of defense
mechanism to the DDOS attack in MANET.
In blockchain technology, cybercriminals exploit new attack surfaces for
non-legitimate persons who wish a dissemination of fake information, encourage cyber
attacks, unethical behavior, etc. Attacks are believed to be attributed to the blockchain
cryptographic architecture, the bottom-line architecture, and the substance in which
they are applied. The main threat is focused on the progressive defense research
activity. It is currently believed that other attacks on the blockchain can be launched
without being able to withstand traditional defenses, a few of which may be used to
deliver any other attack. By delineating these attacks and examining their
countermeasures, it highlights the direction of new research that should be persisted for
safer and more competent use of blockchain. In spite of vulnerabilities and attacks, this
technology offers key features like hashing, immutability and digital signature, which
enrich the blockchain. Researchers also contributed to developing a security shield for
blockchain by using an intelligent combination of these features. Basically, these
features are required to achieve CIA (Confidentiality, Integrity and Authentication).
The contribution of this chapter would be systematically investigating the attack
surface of Blockchain technology. The attack surface is the sum of all conceivable
security risk exposures. It is also the total of all known and undiscovered threats,
possible vulnerabilities, and controls, including all resources. To do this, we set attack
vitality on the attack surface to a variety of attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.