DISTRIBUTED AGENT BASED TECHNIQUE FOR DETECTING DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACKS IN WLAN
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
. J. Singh, S. Gupta and L. Kaur, “A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LANâ€, International Journal of Computer Science and Information Security, Vol. 7, Issue 1, pp. 284-291, 2010.
. J. Singh, S. Gupta and L. Kaur, “Taxonomy of Attacks in Wireless Local Area Networksâ€, Journal of Research
in Computer Engineering, Vol.4, No. 1, 2010.
. J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou, “Distributed defense against DDoS attacks†University of Delaware, CIS Department Technical Report CIS-TR-2005-02, pp. 1-12, 2005.
. A. Challita, M.E. Hassan, S. Maalouf, A. Zouheiry, “A Survey of DDoS Defense Mechanismsâ€, Department of Electrical and Computer Engineering, American University of Beirut, 2004.
. M. Robinson, J. Mirkovic, M. Schnaider, S. Michel and P. Reiher. "Challenges and principles of DDoS defense." In ACM SIGCOMM. 2003.
. W. Znaidi, M. Minier and J.P. Babau, “Detecting wormhole attacks in wireless networks using local neighborhood
information." In proceedings of IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, 2008.
. Y. Xu, G. Chen, J. Ford and F. Makedon, “Distributed wormhole attack detection in wireless sensor networks." In Proceedings of the First Annual IFIP Working Group International Conference on Critical Infrastructure Protection, 2007.
. K.S. Win, “Analysis of detecting wormhole attack in wireless networks", In World Academy of Science, Engineering and Technology, pp. 422-428, 2008.
. Y. C. Hu, Y. Chun, A. Perrig and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks." In IEEE Twenty-Second Annual Joint Conference of the Computer and Communications, Vol. 3, pp. 1976-1986, 2003.
. H. Ronghui, M. Guoqing, W. Chunlei and F. Lan, “Detecting and locating wormhole attacks in wireless sensor networks using beacon nodesâ€, World Academy of Science, Engineering and Technology, Vol. 3, 2009.
. R.Z. El Kaissi, A. Kayssi, A. Chehab and Z. Dawy, “DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networksâ€, Ph.D. Dissertation, American University of Beirut, Department of Electrical and Computer Engineering, 2005.
. S. Choi, D.Y.Kim, D.Y. Lee and J. Jung, "WAP: Wormhole attack prevention algorithm in mobile adhoc networks." In IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343-348, 2008.
. T.V. Phuong, N.T. Canh, Y.K. Lee, S. Lee and H. Lee, “Transmission time-based mechanism to detect wormhole
attacksâ€, In 2nd IEEE Asia-Pacific Service Computing Conference, pp. 172-178, 2007.
. V.S.S. Sriram, A.P. Singh and G. Sahoo, "Methodology for Securing Wireless LANs against Wormhole Attackâ€,
International Journal of Recent Trends in Engineering, Vol. 1, no. 1, 2009.
. Network Simulator, http://www.isi.edu/nsnam/ns
. M. Shojaei, N. Movahhedinia and B.T. Ladani, "DDoS attack detection in IEEE 802.16 based networksâ€, Wireless Networks, Vol. 20, Issue 8, pp. 2543-2559, 2014.
. M. GhasemiGol, A. Ghaemi-Bafghi, M. Moghaddam and H. Sadoghi-Yazdi, “Anomaly detection and
foresight response strategy for wireless sensor networksâ€, Wireless Networks, Vol. 21, Issue 5, pp. 1425-1442, 2014.
. T.V.P. Sundararajan, S. M. Ramesh, R. Maheswar and K. R. Deepak, "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET", Wireless Networks, Vol. 20, Issue 4, pp. 563-578, 2014
. G. Koutepas, F. Stamatelopoulos and B. Maglaris, "Distributed management architecture for cooperative detection and reaction to DDoS attacks", Journal of Network and Systems Management, Vol. 12, Issue 1, pp. 73-94, 2004.
. T. Thapngam, S.Yu, W. Zhou and S.K. Makki, "Distributed Denial of Service (DDoS) detection by traffic pattern analysis†Peer-to-Peer Networking and Applications, Vol. 7, Issue 4, pp. 346-358, 2014.
. G. Lee, W. Kim, K. Kim, S. Oh and D. Kim, “An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networksâ€, Peer-to-Peer Networking and Applications, Vol. 8, Issue 4, pp. 684-693, 2013.
. K. Verma, H. Hasbullah and A. Kumar, “Prevention of DoS attacks in VANETâ€, Wireless Personal Communications, Vol. 73, Issue 1, pp. 95-126, 2013.
. G. Chen, Y. Zhang and C. Wang, “A wireless multi-step attack pattern recognition method for WLANâ€, Expert Systems with Applications, Vol. 41, Issue 16, pp. 7068-7076, 2014.
. M. Andreolini, M. Colajanni and M. Marchetti, “A collaborative framework for intrusion detection in mobile networksâ€, Information Sciences, Vol. 321, pp. 179-192, 2015.
. J. Singh and R.Singh “WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networksâ€, Mobile Information Systems, Vol.6, 2016.
. V.Dhir, R.Kumar and V.Joshi “Performance comparison of routing protocols in mobile ad hoc networks†International Journal of Engineering Science and Technology,Vol.2, pp. 3494-3502, 2010.