Denial of Service Attack in Distributed Wireless Network by Distributed jammer Network: a Birth-Death Random Process Analysis

نویسندگان

  • R. Dhanasekaran
  • G. Singaravel
چکیده

Large number of low power, tiny radio jammers are constituting a Distributed Jammer Network (DJN) is used nowadays to cause a Denial of Service (DoS) attack on a Distributed Wireless Network (DWN). Using NANO technologies, it is possible to build huge number of tiny jammers in millions, if not more. The Denial of Service (DoS) attacks in Distributed Wireless Network (DWN) using Distributed Jammer Network (DJN) considering each of them as separate Poisson Random Process. In an integrated approach, in this study, we advocate the more natural birth-death random process route to study the impact of Distributed Jammer Network (DJN) on the connectivity of Distributed Wireless Network (DWN). We express that the Distributed Jammer Network (DJN) can root a phase transition in the performance of the target network. We use Birth-Death Random Process (BDRP) route for this phase transition to evaluate the collision of Distributed Jammer Network (DJN) on the connectivity and global percolation of the target network. This study confirms the global percolation of Distributed Wireless Network (DWN) is definite when the Distributed Jammer Network (DJN) is not more significant.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCS

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2014