Advertisement

A Comparative Study of DoS Attack Detection and Mitigation Techniques in MANET

  • Divya GautamEmail author
  • Vrinda Tokekar
Conference paper
  • 19 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 100)

Abstract

Mobile ad hoc network is a self-configured, decentralized, constellation of machines that together form architecture less movable network. Because of dynamic changing nature of the network, it is more prone to various attacks. DDoS attacks are the major security risk on mobile ad hoc networks (MANET). DDoS attacks have the tendency to make large volume of unauthorized traffic, due to which the legitimate users cannot use the resources. In this work, various DDoS detection and mitigation techniques have been analyzed. This work has abridged various types of DDoS techniques and attack detection methods. It has also identified advantages and disadvantages of various DDoS defense mechanisms. Volumes of academic research have been discussed that depicts a diverse array of methodologies in detecting, preventing, and mitigating the impact of DDoS attacks.

Keywords

MANET DDoS attack DDoS algorithms Zero-day attack Resource depletion 

References

  1. 1.
    Sandoval G, Wolverton T (2000) Leading web sites under attack. Tech Report. CNET News Tech Rep. TR 2100–1017, 9 Feb 2000Google Scholar
  2. 2.
    Gordon LA, Loeb MP, Lucyshyn W, Richardson R (2004) 2004 CSI/FBI computer crime and security survey. Computer Security Institute, San Francisco, CAGoogle Scholar
  3. 3.
    Dobbins R, Morales C (2010) Worldwide infrastructure security report. Arbor Networks Annual SurveyGoogle Scholar
  4. 4.
  5. 5.
  6. 6.
    Kumar S, Varalakshmi G (2011) Detection of application layer DDoS attack for a popular website using delay of transmission. Int J Adv Eng Sci Technol 10(2):181–184Google Scholar
  7. 7.
    Douligeris C, Mitrokotsa A (2004) DDoS attacks and defense mechanisms: classification and state of the art. Comput J Netw 44(5):643–666CrossRefGoogle Scholar
  8. 8.
    Chauhan G, Nandi S (2008) QoS aware stable path routing (QASR) protocol for MANETs. In: First international conference on emerging trends in engineering and technology, pp 202–207Google Scholar
  9. 9.
    Jun JH, Oh H, Kim SH (2011) DDoS flooding attack detection through a step-by-step investigation. In: IEEE 2nd international conference on networked embedded systems for enterprise applications. ISBN: 978-1-4673-0495-5Google Scholar
  10. 10.
    Erickson J (2008) Hacking—the art of exploitation (2nd edn.). No Starch Press Inc., San Fancisco, CA, p 50, p 250–258Google Scholar
  11. 11.
    Singh A Demystifying denial-of-service attacks. Part one. A report on symantec siteGoogle Scholar
  12. 12.
    Goodrich M, Tamassia R (2011) Introduction to computer security. Morgan Kaufmann Publishers, Boston, MA, pp 256–260Google Scholar
  13. 13.
    Carl C, Kesidis G, Brooks RR, Rai S (2010) Denial-of-service attack-detection techniques. IEEE Internet Comput 82–89CrossRefGoogle Scholar
  14. 14.
  15. 15.
    Lai WS, Lin CH, Liu JC, Huang HC, Yang TC (2008) Using adaptive bandwidth allocation approach to defend DDoS attacks. Int J Softw Eng Its Appl 2(4):61–72Google Scholar
  16. 16.
    Mehfuz S, Doja MN (2008) Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs. J Artif Evol ApplGoogle Scholar
  17. 17.
    Arunmozhi SA, Venkataramani Y (2011) DDoS attack and defense scheme in wireless ad hoc networks. Int J Netw Secur Its Appl (IJNSA) 3(3).  https://doi.org/10.5121/ijnsa.2011.3312CrossRefGoogle Scholar
  18. 18.
    Wu X, Yau DKY (2006) Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game theoretic approach. In: Proceedings of the 2nd ACM symposium on information, computer and communication security, pp 365–367Google Scholar
  19. 19.
    Rao SRS (2011) Denial of service attacks and mitigation techniques: real time implementation with detailed analysis. SANS InstituteGoogle Scholar
  20. 20.
    Xu X, Wei D, Zhang Y (2011) Improved detection approach for distributed denial of service attack based on SVM. IEEE 978-1-4577-0856Google Scholar
  21. 21.
    Mishra A, Gupta BB, Joshi RC (2011) A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques. In: EISIC’11 Proceedings-European intelligence and security informatics conference pages pp 286–289. IEEE Computer Society Washington, DC, USA ISBN: 978-0-7695-4406-9Google Scholar
  22. 22.
    Michalas A, Komninos N, Prasad NR (2011) Mitigate DoS and DDoS attack in mobile ad hoc networks. Int J Digit Crime Forensics 3(1):14–36CrossRefGoogle Scholar
  23. 23.
    Kim Y, Helmy A (2009) CATCH: a protocol framework for cross-layer attacker traceback in mobile multi-hop networks. ElsevierGoogle Scholar
  24. 24.
    Kim Y, Helmy A (2006) Attacker traceback with cross-layer monitoring in wireless multi-hop networks. SASN’06, 30 Oct 2006Google Scholar
  25. 25.
    Ye J, Cheng X, Zhu J, Feng L, Song L (2018) A DDoS attack detection method based on SVM in software defined network. Hindawi, Secur Commun Netw 2018, Article ID 9804061, p 8Google Scholar
  26. 26.
    Noh S, et al (2003) Detecting distributed denial of service (DDoS) attacks through inductive learning. LNCS 2690, pp 286–295Google Scholar
  27. 27.
    Mankins D, Krishnan R, Boyd C, Zao J, Frantz M (2001) Mitigating distributed denial of service attacks with dynamic resource pricing. IEEEGoogle Scholar
  28. 28.
    Mukhopadhyay D, Oh BJ, Shim SH, Kim YC (2010) A study on recent approaches in handling DDoS attacks. Cornell University LibraryGoogle Scholar
  29. 29.
    Lipson HF (2002) Tracking and tracing cyber-attacks: technical challenges and global policy issues. CERT Coordination Center, Special Report: CMU/SEI-2002-SR-009Google Scholar
  30. 30.
    Thatte G, Mitra U, Heidemann J (2005) Detection of low-rate attacks in computer networks. University of Southern California IEEEGoogle Scholar
  31. 31.
    Ansari A, Waheed MA (2017) Flooding attack detection and prevention in MANET based on cross layer link quality assessment. In: 2017 international conference on intelligent computing and control systems (ICICCS). Electronic ISBN: 978-1-5386-2745-7, IEEEGoogle Scholar
  32. 32.
    Fakieh KA (2016) An overview of DDoS attacks detection and prevention in the cloud. Int J Appl Inf Syst (IJAIS)—ISSN: 2249–0868, Foundation of Computer Science FCS, New York, USA, 11(7), December 2016. www.ijais.org

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Amity University Madhya PradeshGwaliorIndia
  2. 2.IET, DAVVIndoreIndia

Personalised recommendations