Design of a Novel Technique for Denial of Service Attack Detection in Wireless Network
DOI:
https://doi.org/10.26438/ijcse/v6i5.464468Keywords:
DDoS attack, Ids attack, ad-hoc network attackAbstract
There are the numbers of techniques available in the literature for the detection of denial of service attack but the effective and efficient detection of this attack in the wireless domain remains open challenges. Recently the detection of distributed denial of services attacks is the major problem in the wireless domain. In this paper, a novel technique has been designed for the detection of distributed denial of service attack in wireless networks. When sending a large scale of data to different nodes, distributed denial-of-service DDoS attacks intend the victims; consequently there is a need to implement a number of DDOS protection techniques all jointly and integrate on multiple techniques, primarily on the areas required uninterrupted service. The data and its value are unprecedented and hence cannot be ignored. This system is based on a mechanism which ensures that the fallacious information did not get injected in any kind of actual data flowing over the network. This paper has focused toward an approach which is detection of DDoS attack over a network. This mechanism works on trust generation mechanism where trust certificate is issued on the basis of training data asset comparison with the actual behavior of any node working over a network. This trust mechanism results into the detection of malicious contents and finding the intruders resulting into the attack over a network.
References
[1] Kaufman Charlie, Perlman Radia, Speciner Mike. Network Security: Private Commu¬nication in a Public World, 2nd ed., USA, Prentice Hall PTR, 2002.
[2] J. Levington M. Unlocking the secret of wireless security. In Oen, p. 23 United Kingdom, Wilmington Business Publishing, Sept. 2002.
[3] Fluher, S. Mantin, I. Shamir,A. Weaknesses in the key scheduling algorithm of RC4 [online], referred 12.4.2003,URL://citeceer.nj.nec.com/fluhrer01.html.
[4] W. Znaidi, M. Minier, and J.P. Babau, "Detecting wormhole attacks in wireless networks using local neighbourhood information." In Proceedings of IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, 2008
[5] Y. Xu, G. Chen, J. Ford and F. Makedon, "Distributed wormhole attack detection in wireless sensor networks." In Proceedings of the First Annual IFIP Working Group International Conference on Critical Infrastructure Protection, 2007.
[6] K.S. Win, "Analysis of detecting wormhole attack in wireless networks", In World Academy °f Science, Engineering and Technology, pp. 422-428, 2008.
[7] Y. C. Hu, Y. Chun, A. Perrig, and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks." In IEEE Twenty-Second Annual Joint Conference of the Computer and Communications, Vol. 3, pp. 1976-1986, 2003.
[8] H. Ronghui, M. Guoqing, W. Chunlei and F. Lan, "Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes", World Academy of Science, Engineering and Technology, Vol. 3 pp. 31-44, 2009.
[9] S.Vijayarani1 Ms. Maria sylviaa intrusion detection system – a study (IJSPTM) vol 4, no 1, february 2015
[10] Mr.Khaire S. H.1 Prof.Hemant Gupta2 Prof.Mayank Bhatt3 IJSRD Vol. 5, Issue 12, 2018 | ISSN (online): 2321-0613
[11] Anju Bala security attacks and challenges of wireless sensor network | volume 3 | issue 1 | issn : 2456- 3307| © 2018 ijsrcseit
[12] Niyati Shah, SharadaValivetiIntrusion Detection Systems for the Availability Attacks in Ad-Hoc Networks ISSN 2277-1956/V1N3-1850-1857 www.ijecse.org
[13] Atul Patel, RuchiKansara, Dr. PareshVirparia A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network (IJACSA) pp 68
[14] Mohammad Sazzadul Hoque1, Md. Abdul Mukit2 and Md. Abu Naser Bikas3 AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM (IJNSA), Vol.4, No.2, March 2012
[15] K. Verma, H. Hasbullah, and A. Kumar, "Prevention of DoS attacks in VANET”, Wireless personal communications, Vol. 73, Issue 1, pp. 95-126, 2013. http://www.indjst.org
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
