Detection of RREQ Flooding Attacks in MANETs

  • B. NithyaEmail author
  • Aishwarya Nair
  • A. S. Sreelakshmi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 847)


Mobile Ad hoc Networks (MANETs) are prone to vulnerabilities as a result of lack of centralized management, dynamic topologies, and predefined boundary. There are many attacks that affect the performance of MANETs. Flooding attack is a Denial of Service attack, also known as DoS attack that brings down the network by flooding with a huge amount of route request (RREQ) packets, routed to a destination that does not exist. This paper proposes a robust detection system; a Fuzzy-based Flooding Attack Detection System (FFADS) using a first-order Mamdani-type fuzzy inference system to detect RREQ flooding attacks. This proposed system uses network-specific parameters rather than node-specific factors. Comprehensive simulations are carried out to observe the variations of input parameters with respect to the flooding level of the system. The simulation results reveal that any deviation from the normal behavior of nodes is immediately detected by the proposed system.


MANET Flooding attacks Fuzzy logic RREQ flooding AODV Network traffic 


  1. 1.
    Ullah, Z., Khan, M.S., Ahmed, I., Javaid, N., Khan, M.I.: Fuzzy-based trust model for detection of selfish nodes in MANETs. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, pp. 965–972 (2016)Google Scholar
  2. 2.
    Chaudhary, A., Tiwari, V., Kumar, A.: A novel intrusion detection system for ad hoc flooding attack using fuzzy logic in mobile ad hoc networks. In: International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Jaipur, pp. 1–4 (2014)Google Scholar
  3. 3.
    Patel, M., Sharma, S.: Detection of malicious attack in MANET a behavioral approach. In: 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, pp. 388–393 (2013)Google Scholar
  4. 4.
    Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Gaiti, D.: Flooding attacks detection in MANETs. In: 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, pp. 1–6 (2015)Google Scholar
  5. 5.
    Choudhury, P., Nandi, S., Pal, A., Debnath, N.C.: Mitigating route request flooding attack in MANET using node reputation. In: IEEE 10th International Conference on Industrial Informatics, Beijing, pp. 1010–1015 (2012)Google Scholar
  6. 6.
    Geetha, K., Sreenath, N.: Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol. Arab. J. Sci. Eng. 41, 1161 (2016)CrossRefGoogle Scholar
  7. 7.
    Chouhan, N.S., Yadav, S.: Flooding attacks prevention in MANET. Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 1(3) (2013)Google Scholar
  8. 8.
    Bhalodiya, S., Balakrishnan, V., Chauhan, R., Chouhan, N.S., Fitri, M.H., Ghonge, M.M., Hong, F., Jawandhiya, P.M., Joshi, K., Lomte, V., Murthy, S.R., Pushpalatha, M., Rai, M.K., Song, J., Tupakula, U., Vaghela, K., Varadharajan, V., Venkataraman, R.: Enhanced detection and recovery from flooding attack in MANETs using AODV routing protocol (2015)Google Scholar
  9. 9.
    Sathish, T., Sasikala, E.: Dynamic profile based technique to detect flooding attack in MANET. Int. J. Innov. Res. Comput. Commun. Eng. 2(1) (2014)Google Scholar
  10. 10.
    Guo, Y., Gordon, S., Perreau, S.: A flow based detection mechanism against flooding attacks in mobile ad hoc networks. In: 2007 IEEE Wireless Communications and Networking Conference, Kowloon, pp. 3105–3110 (2007)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology, TiruchirappalliTiruchirappalliIndia

Personalised recommendations