New-Fangled Method Against Data Flooding Attacks in MANET

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Opportunistic routing to forgo flooding attacks in MANET

______________________________________________________________________________________ Abstract— Adhoc Networks (MANETs) are an emerging area of mobile computing. There are various challenges that are faced in adhoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no ...

متن کامل

Period Based Defence Mechanism against Data flooding attacks

There is a wide usage of mobiles anywhere and anytime to access the multimedia data. Thus there will be more oppurtunity for wireless adhoc networks. Because, comparing with the wired networks, wireless networks provides low cost and easy accesibility. But the main disadvantage for Consumer electronic devices were generally operate on limited battery power and therfore are vulnerable to securit...

متن کامل

Distributed Learning Mechanism Against Flooding Network Attacks

Adaptive techniques based on machine learning and data mining are gaining relevance in selfmanagement and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the tar...

متن کامل

A Prevention Model against Sip Flooding Attacks

Through deeply analyzing on the principle, mode, character of SIP DoS and the flooding attacks faced by SIP network, the prevention model to combine a dynamic threshold adjustment with real-time dynamic prevention for SIP flooding attacks was proposed. This model included logically chi-square traffic judgement model, cumulative statistics model and IP prevention model, among which chi-square tr...

متن کامل

Self-managing defense against SYN-flooding attacks

SYN-flooding attack uses the weakness available in TCP’s three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases PSA (probability of success of attack) and decreases BUE (buffer utilization efficiency) in the victim host and results to decreased performance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Science and Information Technology

سال: 2012

ISSN: 0975-4660

DOI: 10.5121/ijcsit.2012.4303