نتایج جستجو برای: flooding attacks
تعداد نتایج: 70542 فیلتر نتایج به سال:
Vehicular Adhoc Networks (VANETs) are an emerging and promising technology that enables vehicles to communicate with roadside units (RSUs) other vehicles. VANETs contribute improved traffic efficiency, accident safety, entertainment services for passengers drivers. However, face limitations in areas intermittent connectivity. To address this scenario, researchers have proposed a specialized use...
In today, Internet of Things (IoT) has a wide usage area and makes easier our lives with smart objects that can communicate each other without human intervention. However, as Wireless Sensor Networks, IoT networks bring new risks. These risks reaching worrying levels cause some significant issues such security, privacy, energy in the network topology. The IPv6 Routing Protocol for Low-Power Los...
Flooding attack is most challenging security threat in Mobile Adhoc Networks (MANETs). This attack is responsible for reducing the network performance of various routing protocols. In this paper, we will discuss MANETs under the AODV protocol. The existing Flooding attack prevention schemes are not much secure for resistance against flooding attacks. In this article, a new statistical based app...
Employing survivability techniques developed by Architecture Technology Corporation (ATC) under the DARPA OASIS program, VPNshield implements DoSresistant (or survivable) VPNs that provide continuous, uninterrupted operation of VPN services in spite of access link flooding attacks. In contrast to existing infrastructurebased approaches for detecting and countering these attacks, the VPNshield a...
With the emergence of new 4G LTE network, many new security threats have also appeared. Unlike 2G and 3G, 4G uses IP based communication. Due to the excessive internet usage in mobile infrastructure, it has been exposed to various internet-based attacks and security risks of which our focus is on the internet access interface also called the GI interface which is responsible for connecting the ...
Today, internet and web services have become an inseparable part of our lives. Hence, ensuring continuous availability of service has become imperative to the success of any organization. But these services are often hampered by constant threats from myriad types of attacks. One such attack is called distributed denial of service attack that results in issues ranging from temporary slowdown of ...
The major attack on wireless sensor network is Denial–of-service (DoS). DoS attacks like packet dropping, collisions, interference, false route, flooding and buffer overload can destroy the network. One of the most important factors of DoS attacks is packet dropping. Packet dropping means drop packets to interrupt the packet transmission process which make the communication diminish. This paper...
In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naı̈ve Bayes classifier and the Support Vector Machine (SVM). The performance of the classification algorithms is evaluated...
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that ca...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید