Skip to main content

Mitigating the Impact of DDoS Attack on Upsurge Network Performance in MANET

  • Conference paper
  • First Online:
Proceedings of International Conference on Communication and Computational Technologies

Abstract

Mobile entities are unrestricted to form communication grid without any predefined substructure in MANET. Though it offers great resilience, extra challenges for MANETs to guard against malevolent attacks are also fetched. Various tactics have been anticipated to discourse probable challenges to network operation, but they rely on un- bending solutions, which are operative only in anticipated setups. Denial of service (DoS) and distributed DoS (DDoS) attacks are popular challenges to the network performance. Dos attacks devour the system wherewithal but also isolate authentic handlers from the system. The DDoS attack is distributed, and also attempt by several malicious nodes to ood the targeted attacker in the network with a huge number of data packets. This proposed work explains the mitigation method by using node isolation method so that once the malicious node is detected, it will be moved out from the cluster and hence the packet drop in the network due to selfish node attack can be reduced. Also, in this proposed work performance evaluation of ad hoc distance vector (AODV) routing protocols has been analyzed based on throughput and packet delivery ratio parameters using the NS3 simulator. The simulation results show that the proposed scheme achieves high PDR and high detection rate, and also diminish the congestion problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yan Q, Gong Q, Deng F-A (2016) Detection of DDoS attacks against wireless SDN controllers based on the fuzzy synthetic evaluation decision-making model. Ad Hoc Sens Wirel Netw 33:275299

    Google Scholar 

  2. Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tutor 15(4):2046–2068

    Article  Google Scholar 

  3. Karthik S, Bhavadharini RM, Arunachanlam VP (2008) Analyzing interaction between denial of service attack and threats. In: International conference on computing, communication and networking (ICCCN), 2008; Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Magaz 42–51

    Google Scholar 

  4. Spyridopoulos T, Karanikas G, Tryfonas T, Oikonomou G (2013) A game theoretic defense framework against DoS / DDoS cyber-attacks. Comput Sec 38:39–50

    Google Scholar 

  5. Srivatsa M, Iyengar A, Yin J, Liu L (2008) Mitigating application-level denial of service attacks on Web servers: a client-transparent approach, ACM Trans Web (TWEB) 2(3)

    Google Scholar 

  6. Singh V, Poonia RC, Raja L, Sharma G, Trivedi NK (2019) Source redundancy management and host intrusion detection in wireless sensor networks. Recent Patents Comput Sci 12(1)

    Google Scholar 

  7. Singh V, Poonia RC, Raja L, Sharma G, Trivedi NK, Mathur GN (2020) Redundancy management and host intrusion detection in WSN. In: Forensic investigations and risk management in mobile and wireless communications. IGI Global, pp 153–167

    Google Scholar 

  8. Shastri A, Dadhich R, Poonia RC (2011) Performance analysis of on-demand Routing protocols for vehicular ad-hoc Networks. Int J Wirel Mobile Netw (IJWMN) 3(4):103–111

    Google Scholar 

  9. Kambourakis G, Moschos T, Geneiatakis D, Gritzalis S (2008) Detecting DNS amplification attacks, critical information infrastructures security. Lecture Notes Comput Sci 5141:185–196

    Article  Google Scholar 

  10. Aldaej A, Ahamad T (2016) AAODV (Aggrandized Ad Hoc on Demand Vector): a Detection and prevention technique for MANETs. Int J Adv Comput Sci Appl (IJACSA) 7(10)

    Google Scholar 

  11. Kumar S, Saini ML, Kumar S (2020) Improved DYMO-based ACO for MANET using distance and density of nodes. In: Microservices in big data analytics. Springer, Singapore, pp 29–38

    Google Scholar 

  12. Kumar S, Saini ML, Kumar S (2019) Improvement in routing in MANET using spider monkey optimization. Sandeep, improvement in routing in MANET using spider monkey optimization (April 2019)

    Google Scholar 

  13. Kumar S, Saini ML, Kumar S (2018) A survey: swarm based routing algorithm toward improved quality of service in MANET. Int J Manage Technol Eng 8(5):311–322

    Article  Google Scholar 

  14. Monika G, Poonia SK, Goyal D (2017) Attacks finding and prevention techniques in MANET: a survey. Adv Wirel Mobile Commun 10(5):1185–1195

    Google Scholar 

  15. Aljumah A, Ahamad T (2016) Black hole and mobile Ad hoc network (MANET) a simple logical solution. In: International conference on CyberWarfare and security, March 2016

    Google Scholar 

  16. Aljumah A, Ahamad T (2016) A novel approach for detecting DDoS using artificial neural networks. Int J Comput Sci Netw Sec 16(12):132

    Google Scholar 

  17. Piyush Agrawal R, Ghosh K, Das SK (2008) Cooperative black and gray hole attacks in mobile Ad hoc networks. In: 2nd international conference on ubiquitous information management and communication, pp 310–314

    Google Scholar 

  18. Kumar S, Goyal M, Goyal D, Poonia RC (2017) Routing protocols and security issues in MANET. In: 2017 international conference on infocom technologies and unmanned systems (trends and future directions)(ICTUS), IEEE, pp 818–824

    Google Scholar 

  19. Goyal M, Kumar S, Sharma VK, Goyal D (2020) Modified Dragon-Aodv for efficient secure routing. In: Advances in computing and intelligent systems. Springer, Singapore, pp 539–546

    Google Scholar 

  20. Goyal M, Goyal D, Kumar S (2020) Dragon-AODV: efficient Ad Hoc on-demand distance vector routing protocol using dragon fly algorithm. In: Soft computing: theories and applications. Springer, Singapore, pp 181–191

    Google Scholar 

  21. Chen W, Long X, Bai Y, Gao X (2007) A new solution for resisting gray hole attack in mobile Ad-Hoc networks. In: 2nd international conference on communications and networking in China, pp 366–370

    Google Scholar 

  22. Arshad J, Nathan G, Anthony D, Richard M (2008) An outlook on the impact of trust models on routing in mobile

    Google Scholar 

  23. Su M-Y (2010) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34(1):107–17

    Google Scholar 

  24. Gonzalez O, Ansa G, Howarth MP, Pavlou G (2008) Detection and accusation of packet forwarding misbehaviour in mobile ad-hoc networks. J Inter Eng 2(1):181–192

    Google Scholar 

  25. Yan Q, Yu FR, Gong Q, Li J (2016) Software defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun Surv Tutor 18(1):602–22

    Article  Google Scholar 

  26. Shin S, Gu G (2013) Attacking software defined networks: a first feasibility study. In: Proceedings Of ACM Hot SDN, Hong Kong, China, pp 165–166

    Google Scholar 

  27. Li H, Li P, Guo S, Nayak A (2014) Byzantine-resilient secure software-defined networks with multiple controllers in cloud. IEEE Trans Cloud Comput 2:436447

    Google Scholar 

  28. Dao NN, Park J, Park M, Cho S (2015) A feasible method to combat against DDoS attack in SDN network. In: 2015 International conference on information networking (ICOIN). IEEE, pp 309–311

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chour Singh Rajpoot .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rajpoot, C.S., Bairwa, A.K., Sharma, V.K. (2021). Mitigating the Impact of DDoS Attack on Upsurge Network Performance in MANET. In: Purohit, S., Singh Jat, D., Poonia, R., Kumar, S., Hiranwal, S. (eds) Proceedings of International Conference on Communication and Computational Technologies. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-5077-5_14

Download citation

Publish with us

Policies and ethics