DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet

Authors

  • Priya S JIS College of Engineering, Kalyani, Nadia, West Bengal, India
  • Roy K JIS College of Engineering, Kalyani, Nadia, West Bengal, India
  • Nath I JIS College of Engineering, Kalyani, Nadia, West Bengal, India
  • Singh D JIS College of Engineering, Kalyani, Nadia, West Bengal, India

Keywords:

VANET, Ad-hoc,, ITS, Mobile and DoS

Abstract

Increasing number of vehicles in utilize has conducted in the service to supply human and resource security. The present trend calls for the application of technology to automate safety measures in road traffic and since has been known as Intelligent Transport System (ITS). Vehicular Ad hoc Network is like a fork to Mobile Ad hoc Network, where the nodes are mobile vehicles moving in constrained road topology. VANET networks are visualized to be utilized in practical ITS systems around the world. A network standard has been grown as Wireless Access In Vehicular Environment (IEEE 802.11p) to be utilized in VANET which is an alteration to IEEE 802.11 standard. With each innovative technical applications particularly computers and network appliances, come novel safety challenges. Each network in present time is vulnerable to safety attacks and VANET is not the exception. The most notorious attack among all is the Distributed Denial of Service Attack which is obvious as unlike other safety attacks the data packets utilized in it are genuine and authorized packets. In this paper, a novel offensive measure for detection and prevention has been propose.

References

[1] Kuppusamy, K., and S. Malathi. "An effective prevention of attacks using GI Time frequency algorithm under DDOS." International Journal of Network Security & Its Applications 3, no. 6 (2011): 249.

[2] Barford, Paul, Jeffery Kline, David Plonka, and Amos Ron. "A signal analysis of network traffic anomalies." In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement, pp. 71-82, ACM, 2002.

[3] Brutlag, Jake D. "Aberrant Behavior Detection in Time Series for Network Monitoring." In LISA, vol. 14, no. 2000, pp. 139-146. 2000.

[4] Naoumov, Naoum, and Keith Ross. "Exploiting p2p systems for ddos attacks." In Proceedings of the 1st international conference on Scalable information systems, p. 47. ACM, 2006.

[5] Ahmad, Shaikh Sharique, and HiralalSolunke. "Survey on VANET Based Self Adaptive Prioritized Traffic Signal Control." (2018).

[6] Sharma, Richa, and Jyoteesh Malhotra. "A Survey on Mobility Management Techniques in Vehicular Ad-hoc Network." In International Conference on Computing, Communication & Systems, 38, vol. 41. 2014.

[7] Agarwal, Pallavi. "Technical review on different applications, challenges and security in VANET." Journal of Multimedia Technology & Recent Advancements 4, no. 3 (2018): 21-30.

[8] Zhang, Jie. "A survey on trust management for vanets." In 2011 IEEE International Conference on Advanced Information Networking and Applications, pp. 105-112. IEEE, 2011.

[9] Gaikwad, Dhananjay Sudhakar, and Mukesh Zaveri. "VANET routing protocols and mobility models: A survey." In Trends in Network and Communications, pp. 334-342. Springer, Berlin, Heidelberg, 2011.

[10] Hamedani, Parisa Saraj, and Arshin Rezazadeh. "A New Two Level Cluster-Based Routing Protocol for Vehicular Ad Hoc NETwork (VANET)." In 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim), pp. 121-126. IEEE, 2018.

Downloads

Published

2025-11-26

How to Cite

[1]
S. Priya, K. Roy, I. Nath, and D. Singh, “DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet”, Int. J. Comp. Sci. Eng., vol. 7, no. 18, pp. 35–38, Nov. 2025.