Abstract
Mobile entities are unrestricted to form communication grid without any predefined substructure in MANET. Though it offers great resilience, extra challenges for MANETs to guard against malevolent attacks are also fetched. Various tactics have been anticipated to discourse probable challenges to network operation, but they rely on un- bending solutions, which are operative only in anticipated setups. Denial of service (DoS) and distributed DoS (DDoS) attacks are popular challenges to the network performance. Dos attacks devour the system wherewithal but also isolate authentic handlers from the system. The DDoS attack is distributed, and also attempt by several malicious nodes to ood the targeted attacker in the network with a huge number of data packets. This proposed work explains the mitigation method by using node isolation method so that once the malicious node is detected, it will be moved out from the cluster and hence the packet drop in the network due to selfish node attack can be reduced. Also, in this proposed work performance evaluation of ad hoc distance vector (AODV) routing protocols has been analyzed based on throughput and packet delivery ratio parameters using the NS3 simulator. The simulation results show that the proposed scheme achieves high PDR and high detection rate, and also diminish the congestion problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan Q, Gong Q, Deng F-A (2016) Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model. Ad Hoc Sens Wirel Netw 33:275299
Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tutor 15(4):2046–2068
Karthik S, Bhavadharini RM, Arunachanlam VP (2008) Analyzing interaction between denial of service attack and threats. In: International conference on computing, communication and networking (ICCCN), 2008; Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Magaz 42–51
Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defense framework against DoS / DDoS cyber-attacks. Comput Sec 38:39–50
Srivatsa M, Iyengar A, Yin J, Liu L (2008) Mitigating application-level denial of service attacks on Web servers: a client-transparent approach, ACM Trans Web (TWEB) 2(3)
Singh V, Poonia RC, Raja L, Sharma G, Trivedi NK (2019) Source redundancy management and host intrusion detection in wireless sensor networks. Recent Patents Comput Sci 12(1)
Singh V, Poonia RC, Raja L, Sharma G, Trivedi NK, Mathur GN (2020) Redundancy management and host intrusion detection in WSN. In: Forensic investigations and risk management in mobile and wireless communications. IGI Global, pp 153–167
Shastri A, Dadhich R, Poonia RC (2011) Performance analysis of on-demand Routing protocols for vehicular ad-hoc Networks. Int J Wirel Mobile Netw (IJWMN) 3(4):103–111
Kambourakis G, Moschos T, Geneiatakis D, Gritzalis S (2008) Detecting DNS amplification attacks, critical information infrastructures security. Lecture Notes Comput Sci 5141:185–196
Aldaej A, Ahamad T (2016) AAODV (Aggrandized Ad Hoc on Demand Vector): a Detection and prevention technique for MANETs. Int J Adv Comput Sci Appl (IJACSA) 7(10)
Kumar S, Saini ML, Kumar S (2020) Improved DYMO-based ACO for MANET using distance and density of nodes. In: Microservices in big data analytics. Springer, Singapore, pp 29–38
Kumar S, Saini ML, Kumar S (2019) Improvement in routing in MANET using spider monkey optimization. Sandeep, improvement in routing in MANET using spider monkey optimization (April 2019)
Kumar S, Saini ML, Kumar S (2018) A survey: swarm based routing algorithm toward improved quality of service in MANET. Int J Manage Technol Eng 8(5):311–322
Monika G, Poonia SK, Goyal D (2017) Attacks finding and prevention techniques in MANET: a survey. Adv Wirel Mobile Commun 10(5):1185–1195
Aljumah A, Ahamad T (2016) Black hole and mobile Ad hoc network (MANET) a simple logical solution. In: International conference on CyberWarfare and security, March 2016
Aljumah A, Ahamad T (2016) A novel approach for detecting DDoS using artificial neural networks. Int J Comput Sci Netw Sec 16(12):132
Piyush Agrawal R, Ghosh K, Das SK (2008) Cooperative black and gray hole attacks in mobile Ad hoc networks. In: 2nd international conference on ubiquitous information management and communication, pp 310–314
Kumar S, Goyal M, Goyal D, Poonia RC (2017) Routing protocols and security issues in MANET. In: 2017 international conference on infocom technologies and unmanned systems (trends and future directions)(ICTUS), IEEE, pp 818–824
Goyal M, Kumar S, Sharma VK, Goyal D (2020) Modified Dragon-Aodv for efficient secure routing. In: Advances in computing and intelligent systems. Springer, Singapore, pp 539–546
Goyal M, Goyal D, Kumar S (2020) Dragon-AODV: efficient Ad Hoc on-demand distance vector routing protocol using dragon fly algorithm. In: Soft computing: theories and applications. Springer, Singapore, pp 181–191
Chen W, Long X, Bai Y, Gao X (2007) A new solution for resisting gray hole attack in mobile Ad-Hoc networks. In: 2nd international conference on communications and networking in China, pp 366–370
Arshad J, Nathan G, Anthony D, Richard M (2008) An outlook on the impact of trust models on routing in mobile
Su M-Y (2010) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34(1):107–17
Gonzalez O, Ansa G, Howarth MP, Pavlou G (2008) Detection and accusation of packet forwarding misbehaviour in mobile ad-hoc networks. J Inter Eng 2(1):181–192
Yan Q, Yu FR, Gong Q, Li J (2016) Software defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18(1):602–22
Shin S, Gu G (2013) Attacking software defined networks: a first feasibility study. In: Proceedings Of ACM Hot SDN, Hong Kong, China, pp 165–166
Li H, Li P, Guo S, Nayak A (2014) Byzantine-resilient secure software-defined networks with multiple controllers in cloud. IEEE Trans Cloud Comput 2:436447
Dao NN, Park J, Park M, Cho S (2015) A feasible method to combat against DDoS attack in SDN network. In: 2015 International conference on information networking (ICOIN). IEEE, pp 309–311
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rajpoot, C.S., Bairwa, A.K., Sharma, V.K. (2021). Mitigating the Impact of DDoS Attack on Upsurge Network Performance in MANET. In: Purohit, S., Singh Jat, D., Poonia, R., Kumar, S., Hiranwal, S. (eds) Proceedings of International Conference on Communication and Computational Technologies. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-5077-5_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-5077-5_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5076-8
Online ISBN: 978-981-15-5077-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)