Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
Distributed Denial of Service Attacks in Mobile Adhoc Networks

Authors: Gurjinder Kaur, Yogesh Chaba, V. K. Jain

Abstract:

The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious users to flood the victim network with the large amount of data such that the resources of the victim network are exhausted resulting in the deterioration of the network performance. This paper highlights the effects of different types of DDoS attacks in MANETs and categorizes them according to their behavior.

Keywords: Distributed Denial, Mobile Adhoc Networks

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1059423

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1986

References:


[1] Hoang Lan Nguyen, Uyen Trang Nguyen "A study of different types of attacks on multicast in mobile ad hoc networks" Ad Hoc Networks vol 6, page no. 32-46, 2008.
[2] Christos Douligeris and Aikaterini Mitrokotsa "DDOS ATTACKS AND DEFENSE MECHANISMS: A CLASSIFICATION
[3] Arun Raj Kumar, P. and S. Selvakumar"Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment- A Survey on DDoS Attack Tools and Traceback Mechanisms" IEEE International Advance Computing Conference (IACC 2009)India, 6-7 March 2009.
[4] Sven Ehlert , Dimitris Geneiatakis , Thomas Magedanz "Survey of network security systems to counter SIP-baseddenial-of-service attacks", journal of computers &Security vol 29, page no. 2 2 5 - 2 4 3 Year 2010.
[5] TAO PENG, CHRISTOPHER LECKIE, and KOTAGIRI RAMAMOHANARAO, "Survey of Network-Based Defense Mechanisms Counteringthe DoS and DDoS Problems". ACM Computing Surveys, Vol. 39, No. 1, Article 3, Year 2007.
[6] Jarmo Möls├ñ, "Mitigating denial of service attacks: A tutorial" Journal of Computer Security Vol.13 Page no. 807-837 IOS Press , Year 2005.
[7] Charalampos Patrikakis, Michalis Masikos, and Olga Zouraraki, "Distributed Denial of Service Attacks" The Internet Protocol Journal- Vol. 7 no. 4 Dec. 2004.
[8] K.J. Houle, G.M. Weaver, N. Long and R. Thomas, Trends in Denial of Service Attack Technology. CERT Coordination Center, Oct. 2001.
[Online] Available: http://www.cert.org/archive/pdf/ DoS_trends.pdf.
[9] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMMComputer Communication Review 34, vol. 2page no. 39-53, year 2004.