نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

2014
Mohamed A. Abdelshafy Peter J. B. King

AODV is a reactive MANET routing protocol that does not support security of routing messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil security features of the routing messages. In this paper, we study the performance of both AODV and SAODV routing protocols under the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the perform...

2014
Mohamed A. Abdelshafy Peter J. B. King

AODV is a well-known reactive protocol designed for MANET routing. All MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. In this paper, we study the performance of AODV routing protocol in the presence of some of the well-defined attacks in MANET. We use NS-2 network simulator to analyse th...

2009
Soo Bum Lee Virgil D. Gligor Hyun Jung

Title of dissertation: Localizing the Effects of Link Flooding Attacks in the Internet Soo Bum Lee Doctor of Philosophy, 2009 Dissertation directed by: Professor Virgil D. Gligor Department of Electrical and Computer Engineering Malware-contaminated hosts organized as a “bot network” can target and flood network links (e.g., routers). Yet, none of the countermeasures to link flooding proposed t...

Journal: :JNW 2015
Anchit Bijalwan Mohammad Wazid Emmanuel S. Pilli Ramesh Chandra Joshi

Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks...

2012
Meenakshi Patel Sanjay Sharma

Absence of infrastructure and dynamic nature of MANET invites intruder to launch attack, one of them is flooding. On demand routing such as AODV is more popular then proactive routing use flooding to discover route. Attackers used this concept to launch DoS attack like flooding; black hole and gray hole are the known attack in MANET. In this paper we have proposed a new method based on AODV beh...

2014
REDHWAN M. A. SAAD SELVAKUMAR MANICKAM ESRAA ALOMARI MOHAMMED ANBAR PARMINDER SINGH

One of the important protocols in IPv6 implementation is ICMPv6 which is used for neighbor and router discovery. However, this protocol also could be used by attackers to deny network services like ICMPv6 flood attacks which network decreases performance. In ICMPv6 flooding attacks detection, behavioural-based approaches, particularly suffer from the unavailability of the benchmark datasets. Th...

Journal: :journal of advances in computer research 0
hassan asgharian computer engineering, iran university of science and technology, tehran, iran ahmad akbari computer engineering, iran university of science and technology, tehran, iran bijan raahemi school of electrical engineering and computer science, university of ottawa, ottawa, canada

session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...

2015
Maha Abdelhaq Raed Alsaqour Shawkat Abdelhaq

A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all netwo...

2012
Maarten Rijke

Distributed Denial of Service (DDoS) attacks are security attacks that prevent normal use of communication facilities. More and more DDoS attacks are occurring each day. Conventional DDoS attacks are typically based on flooding the server. Currently, other types of DDoS attacks have been observed, such as the mimicry DDoS attack. The mimicry attack is characterized by (1) gradual increase in th...

Journal: :IEEE Transactions on Information Forensics and Security 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید