2013 International Conference on Communication Systems and Network Technologies 2013
DOI: 10.1109/csnt.2013.116
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Prevention of Flooding Attack Using SVM

Abstract: Deficiency of infrastructure and dynamic nature of MANET attracts interloper to launch attack, one of them is flooding. Reactive routing for example AODV is more popular than proactive routing as it uses flooding to find out route. In this technique, attackers launch DoS attack like flooding, black hole and gray hole which are the recognized attacks in MA-NET. In this paper we have proposed a new method based on AODV behavioral metrics detect and prevent MANET flooding attacks. In this method we have used the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…In [21], Patel proposed the use of support vector machine (SVM) algorithm for detecting and preventing flooding attacks. The behavior of every node is collected and passes to the support vector machine to decide if a node is malicious based on a threshold limit.…”
Section: On Machine Learning Approachmentioning
confidence: 99%
“…In [21], Patel proposed the use of support vector machine (SVM) algorithm for detecting and preventing flooding attacks. The behavior of every node is collected and passes to the support vector machine to decide if a node is malicious based on a threshold limit.…”
Section: On Machine Learning Approachmentioning
confidence: 99%
“…Meenakshi patel et al [22] described, detecting and preventing flooding nodes in SVM. That classifies the nodes as par behavioral metrics of particular node cross the threshold limit which is predefined.…”
Section: Machine Lementioning
confidence: 99%
“…Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong in their paper [11] have designed a generic defense against the Adhoc Flooding Attack in mobile Adhoc Network. Their designed mechanism aims at recording the rate of route_request message.…”
Section: Related Papersmentioning
confidence: 99%