2011
DOI: 10.1007/978-3-642-17881-8_21
|View full text |Cite
|
Sign up to set email alerts
|

A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Also, any fragments of the protected photo can be added or conversely deleted. Some of these impacts, such as noisy or filtering, are directed directly at removing or damaging possible embedded marks; other example, cropping and scaling, are aimed at preparing the image for its use (Arunmozhi and Venkataramani, 2011).…”
Section: Methodsmentioning
confidence: 99%
“…Also, any fragments of the protected photo can be added or conversely deleted. Some of these impacts, such as noisy or filtering, are directed directly at removing or damaging possible embedded marks; other example, cropping and scaling, are aimed at preparing the image for its use (Arunmozhi and Venkataramani, 2011).…”
Section: Methodsmentioning
confidence: 99%
“…The utilization of mobile base station helps to minimize the transmission hops. The algorithm used for the detection of DDoS attack is as follows; Arunmozhi et al (14,2011) have presented a flow monitoring technique to prevent network against DDoS attack. The designed mechanism has used the information of medium access control (MAC) layer for the detection of attacker node.…”
Section: Mobility Of Sinkmentioning
confidence: 99%
“…A DDoS attack is a large-scale, coordinated attack on the availability of services at a victim system or network resource [3]. Two types of DDos Attacks are active and passive attack [9].…”
Section: Attacks In Manetmentioning
confidence: 99%