Analysis of Denial of Service Attack Using Proposed Model
|
|
- Elijah Franklin
- 8 years ago
- Views:
Transcription
1 Chapter 5 Analysis of Denial of Service Attack Using Proposed Model 5.0 Introduction An Adhoc network is a collection of nodes that are capable of forming dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the secure and reliable communication paths in the mobile Adhoc network. Each node in the Adhoc network has to believe on other nodes in order to forward packets. Thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile Adhoc network where security is a critical issue and they are forced to rely on the neighbor node, trust plays an important role that could increase the number of successful data transmission. The larger number of trusted nodes results enhances the successful data communication process rate. In this chapter, denial of service (DoS) attack is applied in the network. Evidences are collected to design an intrusion detection engine for MANET intrusion detection system (IDS). The flow diagram of this chapter is given in the Figure Problem Definition for Denial of Service Attack for MANET Problem Definition 1: Simulation without DoS Attack There are 21 MANET workstations with random mobility of (0-20) m/sec, following a random way point trajectory (predefined trajectory 5 for Adhoc network in Opnet). Simulation area is (1000*1000) meter. This simulation area is considered because most of 43
2 the researchers are using this area and it will be easy to compare the results more accurately. But this is not a constraint one can consider any area with varying density of mobile nodes. All nodes are AODV enabled, sending the route request for mobile node 21. Figure 5.2 shows the environment of simulation. Simulation parameters are given in Table 5.1. For the problem definition 1, AODV parameters are given in Table 5.2 and MANET traffic generated parameters are given in Table 5.3. Figure 5.1: Flow diagram for Denial of Service Attack Detection Engine 44
3 Figure 5.2: Simulation environment Table 5.1: Simulation parameters at a glance Parameters Value Simulation Area 1000*1000 (in meters) Simulation Time 1200 Sec Nodes 21 Mobility (0-20)m/sec (Random) Distribution Random Trajectory Trajectory-5 Routing Protocol AODV Table 5.2: AODV Parameters Parameters Value Route Discovery Parameters Default Route Request Retries 5 Route Request Rate Limit 10 (Packets/Sec) Active Route Timeout 3 Hello Interval Uniform (1,1.1) Net Diameter 35 Table 5.3: MANET traffic Parameters Parameters Value Start Time 10 Packet Inter Arrival Time Exponential(1) Packet Size Exponential(1024) bits Destination IP Address Mobile Node 20 45
4 a) Problem Definition 2: With one Malicious Node Problem definition is the same as in problem definition 1, except in this case, one node is malicious and attempting to create a DoS attack for destination node 21. For simulation environment the parameters are same as in shown in the Table 5.1 for normal nodes. AODV and MANET traffic parameters are the same as in Table 5.2 and Table 5.3. Routing parameters for malicious node are shown in Table 5.4. MANET traffic generation parameters are given in Table 5.5. Table 5.4: AODV Routing parameters (malicious node) Parameters Value Route Discovery Parameters Malicious Route Request Retries 100 Route Request Rate Limit 1000 (Packets/Sec) Active Route Timeout 3 Hello Interval Uniform (1,1.1) Net Diameter 100 Table 5.5: MANET Traffic parameters (malicious node) Parameters Value Start Time 10 Packet Inter Arrival Time Exponential(1) Packet Size Exponential( ) bits Destination IP Address Mobile Node Comparison With and Without Malicious Node The performance of the system with and without malicious node are given in Figure 5.3 to Figure After comparing with the result of without denial of service attack, it can be concluded that the performance of the system degrades in the presence of the malicious node. More than one malicious node can be assumed and a total number of nodes in the network may be scalable. But the aim of this research is to extract the data from simulation to design the detection engine for denial of service attack, whatever the number of nodes trusted is large enough or fewer malicious nodes. 46
5 Figure 5.3: Total routing traffic received Figure 5.4: Total routing traffic sent Figure 5.5: Total MANET traffic received 47
6 Figure 5.6: Total MANET traffic sent Figure 5.7: Total packet drop Figure 5.8: Total delay 48
7 Figure 5.9: Target node delay Figure 5.10: Target node packet queue size 5.3 Feature Extraction for Denial of Service Attack The following features are extracted for DoS attack on the basis of above simulation. Total Delay (MDelay); MANET Traffic Sent Ratio (MTSR) = (MANET Traffic Sent by Malicious Node / Total MANET Traffic Sent) *100; MANET Traffic Received Ratio (MTRR) = (MANET Traffic Received by Malicious Node / Total MANET Traffic Received) *100; Routing Traffic Sent Ratio (RTSR) = (Routing Traffic Sent by Malicious Node / Total Routing Traffic Sent) *100; Routing Traffic Received Ratio (RTRR) = (Routing Traffic Received by Malicious Node / Total Routing Traffic Received) *100; Packet Drop Ratio (PDR) = (Packet Drop by Malicious Node / Total Packet Drop) *100; 49
8 Route Request Ratio (RRReq) = (Route Request Generated by Malicious Node / Total Route Request) * 100; Route Reply Ratio (RRRep) = (Route Reply Received by malicious node / Total Route Reply sent by the Destination node); 5.4 Rules Set for DoS Attack Following rule sets are generated. But these rule sets and their threshold value may be changed according to the need and the environment of the network. We may use an incremental approach to build up the rule sets dictionary. If ((MDelay > Sec) If (PDR > 25%) If (MTSR > 50% ^ MTRR < 5%) If (RTSR >10 % ^ RTRR < 5%) If (RRReq > 20% ^ RRRep > 5%)) Then {Not A Friend}; 5.5 Training Data Set for Denial of Service Attack Table 5.6: Training data set for DoS attack Input Features Train Data Set Function Parameters (C,γ) CPU Run Time (in Sec) Mis Classified Support Vector Linear Default Linear (0.5,0.5) Linear (1,0.5) Linear (1,1) Linear (2,1) Radial Default Radial (0.5,0.5) Radial (1,0.5) Radial (1,1) Radial (2,1) Sigmoid Default Sigmoid (0.5,0.5) Sigmoid (1,0.5) Sigmoid (1,1) Sigmoid (2,1)
9 5.6 Testing Data Set for DoS Attack Table 5.7: Test data set for DoS attack Input Test Function Correct Incorrect Accuracy Precision/Recall Features Data Set (%) Linear % / 87.89% Linear % / 91.37% Linear % / 90.34% Linear % / 90.34% Linear % / 90.34% Radial %/97.16% Radial %/96.91% Radial %/96.78% Radial %/97.42% Radial %/97.29% Sigmoid %/100% Sigmoid %/100% Sigmoid %/100% Sigmoid %/100% Sigmoid %/100% A model file generated after training on the training data set is the confidence value generated by SVM LIGHT, which is the value used to test the given test data set of prediction. The accuracy shows the true positive and true negative generated by detection engine. Table 5.6 and Table 5.7 shows the result of training and testing. The accuracy depends upon the nature of input features and their classifications. 5.7 Results and Validation For the given test data set the accuracy of detection engine is the best in case of radial function and observed to be more than 90%, which is satisfactory for an Adhoc environment. The obtained results are observed to be better than the previous work done by the researchers given in Table
10 Table 5.8: Result comparison with previous models for DoS Attack S.No. Model Accuracy 1. Hongmei Deng et. Al [81] (1-SVMDM) 89.95% 2. Hongmei Deng et. Al [81] (2-SVMDM) 90.45% 3. Aleksandar L. et. Al [82], (LOF approach) 68.4% 4. Aleksandar L. et. Al [82], NN approach 73.7% 5. Aleksandar L. et. Al [82], Mahalanobis-based 57.9% approach 6. Aleksandar L. et. Al [82], Unsupervised SVM 84.2% approach 7. Proposed Approach 90.76% 5.8 Conclusion In this chapter, denial of service (DoS) attack is applied in the network using reactive protocol AODV. Evidences are collected, features are extracted and rules are applied to detect the intruder. SVM LIGHT is used to train the data set and then the test data set is used to check the accuracy of the system. Linear, radial and sigmoid functions are used to train and test the data set. Improved accuracy is achieved and which is observed to be more than 90% which is better than previous models. A model file generated for DoS attack will be deployed in an appropriate layer for detection. 52
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationKeywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationSecurity Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
More informationA Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
More informationAutoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
More informationSecurity Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey 21020013@baskent.edu.tr, asafak@baskent.edu.tr
More informationComparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationSecured Secret Sharing over Single Path in VoIP with Consistent Data Transfer
International Journal of Computer Science and Telecommunications [Volume 3, Issue 1, January 2012] 23 ISSN 2047-3338 Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer K. Maheswari
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationA Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationModified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks
Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks B. MALARKODI, B. VENKATARAMANI AND X.T. PRADEEP Department of Electronics and Communication Engineering National
More informationKEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationA Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks
A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationVoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationPerformance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
More informationA Dynamic Reputation Management System for Mobile Ad Hoc Networks
A Dynamic Reputation Management System for Mobile Ad Hoc Networks Eric Chiejina School of Computer Science University of Hertfordshire Hatfield, UK e.chiejina@herts.ac.uk Hannan Xiao School of Computer
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationResearch Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol
Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationIJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationSimulation Based Analysis of VOIP over MANET
Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last
More informationA Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationAn Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
More informationENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6
More informationKeywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
More informationLoad-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
More informationA Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6196-6201 A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationA Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
More informationII RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
More informationChapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
More informationRouting Protocols Security in Ah Hoc Networks
Routing Protocols Security in Ah Hoc Networks Ebrahim Mohammed Louis Dargin Oakland University School of Computer Science and Engineering CSE 681 Information Security ledargin@oakland.edu eamohamm@oakland.edu
More informationKeywords Mobile Ad- Hoc network, fuzzy, dempster-shafer theory.
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Enhancing
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationChapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
More informationIntrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationPerformance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
More informationSimulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2
Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationDETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,
More informationSJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationUNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004
[CRT14] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004 Date: Wednesday 27 th May 2015 Time: 14:00 16:00
More informationSecurity and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationA Review of Secure Ad-hoc Routing
www..org 30 A Review of Secure Ad-hoc Routing Tannu Arora 1, Deepika Arora 2 1 Computer Science, M.D.U/GIET, Sonipat, Haryana, India tannu.arora@gmail.com 2 Computer Science, C.D.L.U, Sirsa, Haryana, India
More informationA Novel Technique to Isolate and Detect Jamming Attack in MANET
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur
More informationRobust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationNODES COOPERATION TRUST METHOD OVER AD HOC NETWORK. A Thesis by. Qi Jiang. Bachelor of Engineering, Jiangxi University of Science and Technology, 2005
NODES COOPERATION TRUST METHOD OVER AD HOC NETWORK A Thesis by Qi Jiang Bachelor of Engineering, Jiangxi University of Science and Technology, 2005 Submitted to the Department of Electrical Engineering
More informationAshok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
More informationComprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
More informationAriadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationPosition and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
More informationComparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
More informationAd hoc On Demand Distance Vector (AODV) Routing Protocol
Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationCross Layer TCP Congestion Control Load Balancing Technique in MANET
Cross Layer TCP Congestion Control Load Balancing Technique in MANET Nidhi Shukla 1, Neelesh Gupta 2, Naushad Parveen 3 1 M.Tech Scholar (ECE), 2 Prof & Head (ECE), 3 Asst. Prof. ( ECE), Department of
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationA Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
More informationStudy and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models
Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models Rachit Jain 1, Laxmi Shrivastava 2 1,2 Department of Electronics, Madhav Institute of Technology and Science,
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationAnt Routing in Mobile Ad Hoc Networks
Ant Routing in Mobile Ad Hoc Networks S. S. Dhillon, X. Arbona and P. Van Mieghem Delft University of Technology Faculty of Electrical Engineering, Mathematics and Computer Science P.O. Box 531, 26 GA,
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationInvestigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,
More informationUnderstanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks*
Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks* Lap Kong Law, Srikanth V. Krishnamurthy, and Michalis Faloutsos Department of Computer Science
More informationSecuring Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks
Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Bok-Nyong Park 1, Wonjun Lee 1 and Christian Shin 2 1 Dept. of Computer Science and Engineering, Korea University,
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationAn Investigation of DOS Flooding Attack in VANET.
A B S T R A C T International Journal of Advance Foundation and Research in Computer (IJAFRC) An Investigation of DOS Flooding Attack in VANET. Vikash Porwal, Rajeev Patel, Dr. R. K. Kapoor. National Institute
More informationComparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol
, pp. 195-208 http://dx.doi.org/10.14257/ijsia.2015.9.6.19 Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol Haiyan Liu 1, * and Zhanlei Shang 2 Engineering Training
More informationSecured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
More informationSmart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More information