Open Access Open Access  Restricted Access Subscription Access

Detection and Defense Mechanism against DDoS in MANET


Affiliations
1 College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, AlKharj, Saudi Arabia
 

DDoS is a serious issue and a ruthless attack in the networks that need to be detected and defended before reaching its target and causing the damage for user, data and the services. So, it is extremely important to prevent DDoS attack rather than letting it occur and then defending it. In this article we have used Reply Request (RREQ) with a thresh hold time mechanism to deal with this threat. We have used calculations and their analysis to detect the threat and the malicious node and with the help of reply request with thresh hold time we have proposed a detection technique and we can detect the malicious data source node as well. In this research we have evaluated the robustness of existing routing protocols against the malicious attacks and assess the quality and impact of security improvements and have proposed a reliable solution to handle DDoS attacks in MANETS.

Keywords

Ad Hoc, Black Hole, DDoS, MANET, Security
User

Abstract Views: 173

PDF Views: 0




  • Detection and Defense Mechanism against DDoS in MANET

Abstract Views: 173  |  PDF Views: 0

Authors

Tariq Ahamad
College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, AlKharj, Saudi Arabia
Abdullah Aljumah
College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, AlKharj, Saudi Arabia

Abstract


DDoS is a serious issue and a ruthless attack in the networks that need to be detected and defended before reaching its target and causing the damage for user, data and the services. So, it is extremely important to prevent DDoS attack rather than letting it occur and then defending it. In this article we have used Reply Request (RREQ) with a thresh hold time mechanism to deal with this threat. We have used calculations and their analysis to detect the threat and the malicious node and with the help of reply request with thresh hold time we have proposed a detection technique and we can detect the malicious data source node as well. In this research we have evaluated the robustness of existing routing protocols against the malicious attacks and assess the quality and impact of security improvements and have proposed a reliable solution to handle DDoS attacks in MANETS.

Keywords


Ad Hoc, Black Hole, DDoS, MANET, Security



DOI: https://doi.org/10.17485/ijst%2F2015%2Fv8i33%2F123350