Main Article Content

Harmeet Singh
Vijay Dhir


By sending large amount of data flows from multiple sites, Distributed Denial-of-Service (DDoS) attacks target the victims. Thus, there is a demand to implement number of DDoS defense techniques all together and collaboratively on many nodes, especially on where there is a need to maintain round-the-clock Internet connectivity. The security mechanism works on a probabilistic basis that is based on the detection of illegitimate traffic and then to discard it, that forced a specific number of legitimate packets to be fallout in the process and reducing the overall quality of service. In this paper a Distributed Agent Based technique for detecting DDoS Attacks in wireless LAN has been proposed. It is fully distributed and provides an early warning when pre-attack activities are detected, using trust mechanisms. From the simulation results it has been found that the proposed distributed agent based architecture achieves high throughput with low packet drop, by detecting and isolating the attack traffic flows.


Download data is not yet available.

Article Details

Author Biographies

Harmeet Singh, Sant Baba Bhag Singh University,Khiala, Jalandhar

Research Scholar,Department of Computer Science & Engineering

Vijay Dhir, Sant Baba Bhag Singh University,Khiala, Jalandhar

Professor,Department of Computer Science & Engineering


. J. Singh, S. Gupta and L. Kaur, “A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LANâ€, International Journal of Computer Science and Information Security, Vol. 7, Issue 1, pp. 284-291, 2010.

. J. Singh, S. Gupta and L. Kaur, “Taxonomy of Attacks in Wireless Local Area Networksâ€, Journal of Research

in Computer Engineering, Vol.4, No. 1, 2010.

. J. Mirkovic, M. Robinson, P. Reiher and G. Oikonomou, “Distributed defense against DDoS attacks†University of Delaware, CIS Department Technical Report CIS-TR-2005-02, pp. 1-12, 2005.

. A. Challita, M.E. Hassan, S. Maalouf, A. Zouheiry, “A Survey of DDoS Defense Mechanismsâ€, Department of Electrical and Computer Engineering, American University of Beirut, 2004.

. M. Robinson, J. Mirkovic, M. Schnaider, S. Michel and P. Reiher. "Challenges and principles of DDoS defense." In ACM SIGCOMM. 2003.

. W. Znaidi, M. Minier and J.P. Babau, “Detecting wormhole attacks in wireless networks using local neighborhood

information." In proceedings of IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1-5, 2008.

. Y. Xu, G. Chen, J. Ford and F. Makedon, “Distributed wormhole attack detection in wireless sensor networks." In Proceedings of the First Annual IFIP Working Group International Conference on Critical Infrastructure Protection, 2007.

. K.S. Win, “Analysis of detecting wormhole attack in wireless networks", In World Academy of Science, Engineering and Technology, pp. 422-428, 2008.

. Y. C. Hu, Y. Chun, A. Perrig and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks." In IEEE Twenty-Second Annual Joint Conference of the Computer and Communications, Vol. 3, pp. 1976-1986, 2003.

. H. Ronghui, M. Guoqing, W. Chunlei and F. Lan, “Detecting and locating wormhole attacks in wireless sensor networks using beacon nodesâ€, World Academy of Science, Engineering and Technology, Vol. 3, 2009.

. R.Z. El Kaissi, A. Kayssi, A. Chehab and Z. Dawy, “DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networksâ€, Ph.D. Dissertation, American University of Beirut, Department of Electrical and Computer Engineering, 2005.

. S. Choi, D.Y.Kim, D.Y. Lee and J. Jung, "WAP: Wormhole attack prevention algorithm in mobile adhoc networks." In IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343-348, 2008.

. T.V. Phuong, N.T. Canh, Y.K. Lee, S. Lee and H. Lee, “Transmission time-based mechanism to detect wormhole

attacksâ€, In 2nd IEEE Asia-Pacific Service Computing Conference, pp. 172-178, 2007.

. V.S.S. Sriram, A.P. Singh and G. Sahoo, "Methodology for Securing Wireless LANs against Wormhole Attackâ€,

International Journal of Recent Trends in Engineering, Vol. 1, no. 1, 2009.

. Network Simulator, http://www.isi.edu/nsnam/ns

. M. Shojaei, N. Movahhedinia and B.T. Ladani, "DDoS attack detection in IEEE 802.16 based networksâ€, Wireless Networks, Vol. 20, Issue 8, pp. 2543-2559, 2014.

. M. GhasemiGol, A. Ghaemi-Bafghi, M. Moghaddam and H. Sadoghi-Yazdi, “Anomaly detection and

foresight response strategy for wireless sensor networksâ€, Wireless Networks, Vol. 21, Issue 5, pp. 1425-1442, 2014.

. T.V.P. Sundararajan, S. M. Ramesh, R. Maheswar and K. R. Deepak, "Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET", Wireless Networks, Vol. 20, Issue 4, pp. 563-578, 2014

. G. Koutepas, F. Stamatelopoulos and B. Maglaris, "Distributed management architecture for cooperative detection and reaction to DDoS attacks", Journal of Network and Systems Management, Vol. 12, Issue 1, pp. 73-94, 2004.

. T. Thapngam, S.Yu, W. Zhou and S.K. Makki, "Distributed Denial of Service (DDoS) detection by traffic pattern analysis†Peer-to-Peer Networking and Applications, Vol. 7, Issue 4, pp. 346-358, 2014.

. G. Lee, W. Kim, K. Kim, S. Oh and D. Kim, “An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networksâ€, Peer-to-Peer Networking and Applications, Vol. 8, Issue 4, pp. 684-693, 2013.

. K. Verma, H. Hasbullah and A. Kumar, “Prevention of DoS attacks in VANETâ€, Wireless Personal Communications, Vol. 73, Issue 1, pp. 95-126, 2013.

. G. Chen, Y. Zhang and C. Wang, “A wireless multi-step attack pattern recognition method for WLANâ€, Expert Systems with Applications, Vol. 41, Issue 16, pp. 7068-7076, 2014.

. M. Andreolini, M. Colajanni and M. Marchetti, “A collaborative framework for intrusion detection in mobile networksâ€, Information Sciences, Vol. 321, pp. 179-192, 2015.

. J. Singh and R.Singh “WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networksâ€, Mobile Information Systems, Vol.6, 2016.

. V.Dhir, R.Kumar and V.Joshi “Performance comparison of routing protocols in mobile ad hoc networks†International Journal of Engineering Science and Technology,Vol.2, pp. 3494-3502, 2010.

Most read articles by the same author(s)