نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

Journal: :IEEE Access 2023

Vehicular Adhoc Networks (VANETs) are an emerging and promising technology that enables vehicles to communicate with roadside units (RSUs) other vehicles. VANETs contribute improved traffic efficiency, accident safety, entertainment services for passengers drivers. However, face limitations in areas intermittent connectivity. To address this scenario, researchers have proposed a specialized use...

Journal: :International Journal of Hybrid Information Technology 2014

Journal: :Europan journal of science and technology 2021

In today, Internet of Things (IoT) has a wide usage area and makes easier our lives with smart objects that can communicate each other without human intervention. However, as Wireless Sensor Networks, IoT networks bring new risks. These risks reaching worrying levels cause some significant issues such security, privacy, energy in the network topology. The IPv6 Routing Protocol for Low-Power Los...

2017
Opinder Singh Ravinder Singh Jatinder Singh

Flooding attack is most challenging security threat in Mobile Adhoc Networks (MANETs). This attack is responsible for reducing the network performance of various routing protocols. In this paper, we will discuss MANETs under the AODV protocol. The existing Flooding attack prevention schemes are not much secure for resistance against flooding attacks. In this article, a new statistical based app...

2003
Ranga S. Ramanujan Maher Kaddoura J. Wu C. Sanders K. Millikin

Employing survivability techniques developed by Architecture Technology Corporation (ATC) under the DARPA OASIS program, VPNshield implements DoSresistant (or survivable) VPNs that provide continuous, uninterrupted operation of VPN services in spite of access link flooding attacks. In contrast to existing infrastructurebased approaches for detecting and countering these attacks, the VPNshield a...

2016
Sundus Ayyaz Muazzam A. Khan Jawad Ahmad Cory Beard Baek Y. Choi Nazar A. Saqib

With the emergence of new 4G LTE network, many new security threats have also appeared. Unlike 2G and 3G, 4G uses IP based communication. Due to the excessive internet usage in mobile infrastructure, it has been exposed to various internet-based attacks and security risks of which our focus is on the internet access interface also called the GI interface which is responsible for connecting the ...

Journal: :CoRR 2015
Hrishikesh Deshpande

Today, internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of ...

2013
Sunita O. S. Khanna Amandeep Kaur

The major attack on wireless sensor network is Denial–of-service (DoS). DoS attacks like packet dropping, collisions, interference, false route, flooding and buffer overload can destroy the network. One of the most important factors of DoS attacks is packet dropping. Packet dropping means drop packets to interrupt the packet transmission process which make the communication diminish. This paper...

2008
Aikaterini Mitrokotsa Manolis Tsagkaris Christos Douligeris

In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naı̈ve Bayes classifier and the Support Vector Machine (SVM). The performance of the classification algorithms is evaluated...

2008
Rashid Hafeez Khokhar Md Asri Ngadi

A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید