Abstract

DDoS PREVENTION TECHNIQUE

MADHU MALIK

107-122

Vol: 2, Issue: 2, 2012

A mobile ad hoc network (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. Routing protocols of MANET should be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols. Security has become a primary concern in order to provide protected communication between nodes in a potentially hostile environment. Distributed Denial of Service (DDoS) attacks has also become a major problem in MANET. A DDoS attack is a distributed, large-scale attempt by malicious users to flood the victim network with an enormous number of packets. This exhausts the victim network of resources such as bandwidth, computing power, etc. The victim is unable to provide services to its legitimate clients and network performance is greatly deteriorated. In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols.

Download PDF

    References

  1. Han L; Wireless Ad hoc Network; October 8, 2004.
  2. Stephen M. Specht and Ruby B. Lee; Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures; Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 543-550; September 2004.
  3. A. Sun; The design and implementation of fisheye routing protocol for mobile ad hoc networks; M.S. Thesis, Department of Electrical and Computer Science, MIT; May 2002.
  4. TFreak; smurf.c; www.phreak.org/archives/exploits/denial/smurf.c; May 6, 2003.
  5. Federal Computer Incident Response Center (FedCIRC); Defense Tactics for Distributed Denial of Service Attacks; Washington, DC; 2000.
  6. TFreak; fraggle.c; www.phreak.org/archives/exploits/denial/fraggle.c; May 6, 2003.
  7. J. MÄolsÄa; Mitigating denial of service attacks in computer networks; PhD thesis; Helsinki University of Technology, Espoo, Finland; June 2006.
  8. V. Paxson; An analysis of using reflectors for distributed denial-of-service attacks; ACM SIGCOMM Computer Communication Review, vol. 31, no. 3; July 2001.
  9. Yonghua You; A defense framework for flooding-based DDoS attacks; Master of Sc. Thesis; Queen's University Kingston, Ontario, Canada; August 2007.
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.