Defense against DoS Attack using Monitoring Node

نویسندگان

  • Ann Mary Varghese
  • K. Selvaraj
چکیده

Consider a scenario where a sophisticated jammer jams an area in which a single-channel random access based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network and a notification message is transferred out of the jammed region. In this paper introduce a network defense policy node for monitoring the jammer in order to overcome from attack to network. The monitoring node misleads the jammer that the server is down but actually the server is not down. This paper provides valuable insights about the structure of the jamming problem and associated defense mechanisms for achieving desirable performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET

Reduction of Quality (ROQ) attack is one of the Denial of Service (DoS) attacks which affect the MANETs. Instead of refusing the clients from the services completely, these RoQ attacks throttle the TCP throughput heavily and reduce the QoS to end systems. To mitigate this RoQ attack in MANET, we propose to design a distributed defense technique in this paper. Initially, a mechanism for monitor ...

متن کامل

A New Routing Attack in Mobile Ad Hoc Networks

Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a ne...

متن کامل

Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE

Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self – configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh connectivity. Because of their fast connectivity wireless mesh networ...

متن کامل

Defending against Denial of Service in a Self-Aware Network: A practical approach

In recent years, Denial of Service attacks have evolved into a predominant network security threat. Motivated by an impressive variety of reasons and directed against an equally impressive variety of targets, DoS attacks are not as difficult to launch as one would expect. Protection against them is, however, disproportionately difficult. Recognising the fact that the networks of the near future...

متن کامل

Mitigating Denial of Service Attacks in Computer Networks

Monograph Article dissertation (summary + original articles) Department Laboratory Field of research Opponents Supervisor Abstract Keywords Network security, denial of service attacks, attack mechanisms, defense mechanisms. X This dissertation studies how to defend against denial of service (DoS) attacks in computer networks. As it is not possible to prevent these attacks, one must concentrate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012