Defense against DoS Attack using Monitoring Node
نویسندگان
چکیده
Consider a scenario where a sophisticated jammer jams an area in which a single-channel random access based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network and a notification message is transferred out of the jammed region. In this paper introduce a network defense policy node for monitoring the jammer in order to overcome from attack to network. The monitoring node misleads the jammer that the server is down but actually the server is not down. This paper provides valuable insights about the structure of the jamming problem and associated defense mechanisms for achieving desirable performance.
منابع مشابه
A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET
Reduction of Quality (ROQ) attack is one of the Denial of Service (DoS) attacks which affect the MANETs. Instead of refusing the clients from the services completely, these RoQ attacks throttle the TCP throughput heavily and reduce the QoS to end systems. To mitigate this RoQ attack in MANET, we propose to design a distributed defense technique in this paper. Initially, a mechanism for monitor ...
متن کاملA New Routing Attack in Mobile Ad Hoc Networks
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a ne...
متن کاملMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self – configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh connectivity. Because of their fast connectivity wireless mesh networ...
متن کاملDefending against Denial of Service in a Self-Aware Network: A practical approach
In recent years, Denial of Service attacks have evolved into a predominant network security threat. Motivated by an impressive variety of reasons and directed against an equally impressive variety of targets, DoS attacks are not as difficult to launch as one would expect. Protection against them is, however, disproportionately difficult. Recognising the fact that the networks of the near future...
متن کاملMitigating Denial of Service Attacks in Computer Networks
Monograph Article dissertation (summary + original articles) Department Laboratory Field of research Opponents Supervisor Abstract Keywords Network security, denial of service attacks, attack mechanisms, defense mechanisms. X This dissertation studies how to defend against denial of service (DoS) attacks in computer networks. As it is not possible to prevent these attacks, one must concentrate ...
متن کامل