2009
DOI: 10.4304/jnw.4.3.178-183
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Disable IP Broadcast Technique for Prevention of Flooding-Based DDoS Attack in MANET

Abstract:

In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad hoc On Demand Vector (AODV) routing protocol as the base protocol it is possible to find a suitable solution to overcome the malicious flooding i.e. attack of initiat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…The First type of DDoS attack aims at attacking the victim node so as to drop some or all of the data packets for further forwarding even when there is no congestion in the network, is known as Malicious Packet Dropping-based DDoS attack [36]. The second type of DDoS attack is based on a huge volume of attack traffic, which is known as a Flooding-based DDoS attack [36]. A flooding-based DDoS attack tries to clog the victim's network bandwidth and other resources with real-looking but unwanted IP data.…”
Section: Ddos Attack Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…The First type of DDoS attack aims at attacking the victim node so as to drop some or all of the data packets for further forwarding even when there is no congestion in the network, is known as Malicious Packet Dropping-based DDoS attack [36]. The second type of DDoS attack is based on a huge volume of attack traffic, which is known as a Flooding-based DDoS attack [36]. A flooding-based DDoS attack tries to clog the victim's network bandwidth and other resources with real-looking but unwanted IP data.…”
Section: Ddos Attack Mechanismmentioning
confidence: 99%
“…Cisco routers support two kinds of broadcasting, the directed broadcast and the flooded one. In a directed broadcast, a packet is sent to a specific network or series of networks, whereas a flooded broadcast is a packet meant for every network or for every node in the network [36].…”
Section: Proposed Prevention Techniquementioning
confidence: 99%
“…• Flooding attack: The attacker attempts to overload the network bandwidth by broadcasting massive forged packets (Chaba et al, 2009). In our experiment, some malicious nodes send out mass RREQ packets all over the network.…”
Section: Security In Manetsmentioning
confidence: 99%
“…The Denial of service (DoS) attack is an unsolved tough problem in internet for many years. This problem became more serious due to appearance of many variant DoS attacks, which can be divided into two types of attack, which are defined as Flood [1] and Shrew [2]. The Flood DoS attacks send large volume of traffic to throttle the victim, while the Shrew attacks dispatch relative low rate of flows to degrade the target service performance.…”
Section: Introductionmentioning
confidence: 99%