Browse > Article

A Study on Flooding Attack Detection and Response Technique in MANET  

Yang, Hwan Seok (중부대학교 정보보호학과)
Yoo, Seung Jae (중부대학교 정보보호학과)
Publication Information
Abstract
Routing protocol using in the existing wire network cannot be used as it is for efficient data transmission in MANET. Because it consists of only mobile nodes, network topology is changing dynamically. Therefore, each mobile node must perform router functions. Variety of routing attack like DoS in MANET is present owing to these characteristic. In this paper, we proposed cooperative-based detection method to improve detection performance of flooding attack which paralyzes network by consuming resource. Accurate attack detection is done as per calculated adaptively threshold value considered the amount of all network traffic and the number of nodes. All the mobile nodes used a table called NHT to perform collaborative detection and apply cluster structure to the center surveillance of traffic.
Keywords
Flooding Attack; DoS; MANET; AODV;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, Vol.13, No.6, pp.24-30, 1999.
2 Y. A. Huang and W. Lee, "A cooperative intrusion detection system for ad hoc networks," In the Proc. of 1st ACM Workshop on Ad hoc and Sensor Networks, pp.135-147, 2003.
3 W. Ren, D. Y. Yeung, H. Jin and M. Yang, "Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks," Int. Journal of Network Security, Vol.4, No.2, pp.227-234, 2007.
4 R. H. Khokhar, Md. A. Ngadi, S. Manda, "A Review of Current Routing Attacks in Mobile Ad Hoc Networks," International Journal of Computer Science and Security, Vol.2, No.3, pp.18-29, 2008.
5 A. Rajaram, S. Palaniswami, "The Trust-based MAC-Layer Sercurity Protocol for Mobile Ad hoc Networks," Int. Journal on Computer Science and Engineering, Vol.2, No.2, pp.400-408, 2010.
6 C.E Perkins, E. M Royer, "The Ad-hoc On-demand Distance Vector Protocol (AODV)," in Ad-hoc networking, Addison-Wesley, pp.173-219, 2001.
7 X.Jin, et al, "ZSBT: A novel algorithm for tracing DoS attackers in MANETs," EURASIP Journal on Wireless Communications and Networking, Vol.2006, pp.1-9, 2006.