Abstract
Mobile ad hoc network is a self-configured, decentralized, constellation of machines that together form architecture less movable network. Because of dynamic changing nature of the network, it is more prone to various attacks. DDoS attacks are the major security risk on mobile ad hoc networks (MANET). DDoS attacks have the tendency to make large volume of unauthorized traffic, due to which the legitimate users cannot use the resources. In this work, various DDoS detection and mitigation techniques have been analyzed. This work has abridged various types of DDoS techniques and attack detection methods. It has also identified advantages and disadvantages of various DDoS defense mechanisms. Volumes of academic research have been discussed that depicts a diverse array of methodologies in detecting, preventing, and mitigating the impact of DDoS attacks.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sandoval G, Wolverton T (2000) Leading web sites under attack. Tech Report. CNET News Tech Rep. TR 2100–1017, 9 Feb 2000
Gordon LA, Loeb MP, Lucyshyn W, Richardson R (2004) 2004 CSI/FBI computer crime and security survey. Computer Security Institute, San Francisco, CA
Dobbins R, Morales C (2010) Worldwide infrastructure security report. Arbor Networks Annual Survey
http://www.neustar.biz/enterprise/resources/ddos-protection/2012ddosattackreport#.UlT_otdR5DI
http://www.itproportal.com/2013/07/31/ddos-attacks-rise-dramatically-first-half-2013
Kumar S, Varalakshmi G (2011) Detection of application layer DDoS attack for a popular website using delay of transmission. Int J Adv Eng Sci Technol 10(2):181–184
Douligeris C, Mitrokotsa A (2004) DDoS attacks and defense mechanisms: classification and state of the art. Comput J Netw 44(5):643–666
Chauhan G, Nandi S (2008) QoS aware stable path routing (QASR) protocol for MANETs. In: First international conference on emerging trends in engineering and technology, pp 202–207
Jun JH, Oh H, Kim SH (2011) DDoS flooding attack detection through a step-by-step investigation. In: IEEE 2nd international conference on networked embedded systems for enterprise applications. ISBN: 978-1-4673-0495-5
Erickson J (2008) Hacking—the art of exploitation (2nd edn.). No Starch Press Inc., San Fancisco, CA, p 50, p 250–258
Singh A Demystifying denial-of-service attacks. Part one. A report on symantec site
Goodrich M, Tamassia R (2011) Introduction to computer security. Morgan Kaufmann Publishers, Boston, MA, pp 256–260
Carl C, Kesidis G, Brooks RR, Rai S (2010) Denial-of-service attack-detection techniques. IEEE Internet Comput 82–89
Lai WS, Lin CH, Liu JC, Huang HC, Yang TC (2008) Using adaptive bandwidth allocation approach to defend DDoS attacks. Int J Softw Eng Its Appl 2(4):61–72
Mehfuz S, Doja MN (2008) Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs. J Artif Evol Appl
Arunmozhi SA, Venkataramani Y (2011) DDoS attack and defense scheme in wireless ad hoc networks. Int J Netw Secur Its Appl (IJNSA) 3(3). https://doi.org/10.5121/ijnsa.2011.3312
Wu X, Yau DKY (2006) Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game theoretic approach. In: Proceedings of the 2nd ACM symposium on information, computer and communication security, pp 365–367
Rao SRS (2011) Denial of service attacks and mitigation techniques: real time implementation with detailed analysis. SANS Institute
Xu X, Wei D, Zhang Y (2011) Improved detection approach for distributed denial of service attack based on SVM. IEEE 978-1-4577-0856
Mishra A, Gupta BB, Joshi RC (2011) A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques. In: EISIC’11 Proceedings-European intelligence and security informatics conference pages pp 286–289. IEEE Computer Society Washington, DC, USA ISBN: 978-0-7695-4406-9
Michalas A, Komninos N, Prasad NR (2011) Mitigate DoS and DDoS attack in mobile ad hoc networks. Int J Digit Crime Forensics 3(1):14–36
Kim Y, Helmy A (2009) CATCH: a protocol framework for cross-layer attacker traceback in mobile multi-hop networks. Elsevier
Kim Y, Helmy A (2006) Attacker traceback with cross-layer monitoring in wireless multi-hop networks. SASN’06, 30 Oct 2006
Ye J, Cheng X, Zhu J, Feng L, Song L (2018) A DDoS attack detection method based on SVM in software defined network. Hindawi, Secur Commun Netw 2018, Article ID 9804061, p 8
Noh S, et al (2003) Detecting distributed denial of service (DDoS) attacks through inductive learning. LNCS 2690, pp 286–295
Mankins D, Krishnan R, Boyd C, Zao J, Frantz M (2001) Mitigating distributed denial of service attacks with dynamic resource pricing. IEEE
Mukhopadhyay D, Oh BJ, Shim SH, Kim YC (2010) A study on recent approaches in handling DDoS attacks. Cornell University Library
Lipson HF (2002) Tracking and tracing cyber-attacks: technical challenges and global policy issues. CERT Coordination Center, Special Report: CMU/SEI-2002-SR-009
Thatte G, Mitra U, Heidemann J (2005) Detection of low-rate attacks in computer networks. University of Southern California IEEE
Ansari A, Waheed MA (2017) Flooding attack detection and prevention in MANET based on cross layer link quality assessment. In: 2017 international conference on intelligent computing and control systems (ICICCS). Electronic ISBN: 978-1-5386-2745-7, IEEE
Fakieh KA (2016) An overview of DDoS attacks detection and prevention in the cloud. Int J Appl Inf Syst (IJAIS)—ISSN: 2249–0868, Foundation of Computer Science FCS, New York, USA, 11(7), December 2016. www.ijais.org
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gautam, D., Tokekar, V. (2020). A Comparative Study of DoS Attack Detection and Mitigation Techniques in MANET . In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_50
Download citation
DOI: https://doi.org/10.1007/978-981-15-2071-6_50
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2070-9
Online ISBN: 978-981-15-2071-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)