SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 719
Review of Flooding Attack Detection in AODV Protocol for
Mobile Ad-hoc Network
Parth C. Bhatiya
1
Hitesh M. Barot
2
1, 2
PG Student [Computer Engineering]
1
KLDRP- ITR, Gandhinagar
2
ACET, Khatraj, Gandhinagar
Abstract—Ad Hoc Networks are extremely vulnerable to
attacks due to their dynamically changing topology, absence
of conventional security infrastructures, vulnerability of
nodes and channels and open medium of communication.
Denial of Service (DoS) and Distributed DoS (DDoS)
attacks are two of the most harmful threats to the network
functionality. The Prevention methods like authentication
and cryptography techniques alone are not able to provide
the security to these types of networks. Therefore, efficient
intrusion detection must be deployed to facilitate the
identification and isolation of attacks. Major attacks on
Mobile Ad hoc networks are flooding, selective forwarding,
sinkhole, wormhole etc. We have presented various
intrusion detection techniques in MANET. Then we have
proposed a method to detect flooding attack in MANET.
Keywords: MANET, flooding attack, Denial of Service
(DOS), packets, route request.
I. INTRODUCTION
Mobile ad hoc network (MANET) is an autonomous system
of mobile nodes connected by wireless links. Each node
operates not only as an end system, but also as a router to
forward packets. The nodes are free to move about and
organize themselves into a network. These nodes change
position frequently. The main classes of routing protocols
are Proactive, Reactive and Hybrid.
A Reactive (on-demand) routing strategy is a
popular routing category for wireless ad hoc routing. It is a
relatively new routing philosophy that provides a scalable
solution to relatively large network topologies. The design
follows the idea that each node tries to reduce routing
overhead by sending routing packets whenever a
communication is requested.
MANET is a kind of wireless ad-hoc network and
it is a self-configuring network of mobile routers (and
associated hosts) connected by wireless links – the union of
which forms an arbitrary topology. The routers, the
participating nodes act as router, are free to move randomly
and manage themselves arbitrarily; thus, the network's
wireless topology may change rapidly and unpredictably.
Such a network may operate in a standalone fashion, or may
be connected to the larger Internet [1].
Fig. 1: Example of a simple ad-hoc network with three
participating nodes
In Figure 1 nodes A and C must discover the route through
B in order to communicate. The circles indicate the nominal
range of each node’s radio transceiver. Nodes A and C are
not in direct transmission range of each other, since A„s
circle does not cover C [1].
II. RELATED WORK
AODV is a reactive routing protocol [6] in which the
network generates routes at the start of communication.
Each node has its own sequence number and this number
increases when links change. Each node judges whether the
channel information is new according to sequence numbers.
When a node wants to find a route to a destination node, it
broadcasts a Route Request (RREQ) message with a unique
RREQ ID to all its neighbors. When a node receives a
RREQ message, it updates the sequence number of source
node and sets up reverse routes to the source node in the
routing tables. If the node is the destination or the node has a
valid route to the destination, it unicasts a route reply
(RREP) back to the source node. The source node or the
intermediate nodes that receives RREP will update its
forward route to destination in the routing tables. Otherwise,
it continues broadcasting the RREQ. If a node receives a
RREQ message that has already processed, it discards the
RREQ and does not forward it. When a link is broken, route
error packets (RERR) are propagated to the source node
along the reverse route and all intermediate nodes will erase
the entry in their routing tables.
The source node or the intermediate nodes that
receives RREP will update its forward route to destination in
the routing tables. Otherwise, it continues broadcasting the
RREQ. If a node receives a RREQ message that has already
processed, it discards the RREQ and does not forward it. In
AODV, sequence number (SN) plays a role to indicate the
freshness of the routing information and guarantee loop-free
routes. Sequence number is increased under only two
conditions: when the source node initiates RREQ and when
the destination node replies with RREP. Sequence number
can be updated only by the source or destination. Hop count
(HC) is used to determine the shortest path and it is
increased by 1 if RREQ or RREP is forwarded each hop.
When a link is broken, route error packets (RERR) are
propagated to the source node along the reverse route and all
intermediate nodes will erase the entry in their routing
tables. AODV maintains the connectivity of neighbor nodes
by sending hello message periodically.
Flooding RREQ packets in the whole network will
consume a lot of resource of network. To reduce congestion
in a network, the AODV protocol adopts some methods. A
node cannot originate more than RREQ_RATELIMIT
RREQ messages per second. After broadcasting a RREQ, a
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 3/2013/0081)
All rights reserved by www.ijsrd.com
720
node waits for a RREP. If a route is not received within
round-trip milliseconds, the node may try again to discover
a route by broadcasting another RREQ, up to a maximum of
retry times at the maximum TTL value. Repeated attempts
by a source node at route discovery for a single destination
must utilize a binary exponential back off. The first time a
source node broadcasts a RREQ, it waits round-trip time for
the reception of a RREP. If a RREP is not received within
that time, the source node sends a new RREQ. When
calculating the time to wait for the RREP after sending the
second RREQ, the source node MUST use a binary
exponential back off. Hence, the waiting time for the RREP
corresponding to the second RREQ is 2 * round-trip time.
The RREQ packets are broadcast in an incrementing ring to
reduce the overhead caused by flooding the whole network.
The packets are flooded in a small area (a ring) first defined
by a starting TTL (time-to-live) in the IP headers. After
RING TRAVERSAL TIME, if no RREP has been received,
the flooded area is enlarged by increasing the TTL by a
fixed value. The procedure is repeated until an RREP is
received by the originator of the RREQ, i.e., the route has
been found.
Fig. 2: Demonstration of flooding attack [9]
Simple mechanism proposed to prevent the flooding attack
in the AODV protocol [7]. In this approach, each node
monitors and calculates the rate of its neighbors’ RREQ. If
the RREQ rate of any neighbor exceeds the predefined
threshold, the node records the ID of this neighbor in a
blacklist. Then, the node drops any future RREQs from
nodes that are listed in the blacklist. The limitation of this
approach is that it cannot prevent against the flooding attack
in which the flooding rate is below the threshold. Another
drawback of this approach is that if a malicious node
impersonates the ID of a legitimate node and broadcasts a
large number of RREQs, other nodes might put the ID of
this legitimate node on the blacklist by mistake.
In [8], the authors proposed an adaptive technique
to mitigate the effect of a flooding attack in the AODV
protocol. This technique is based on statistical analysis to
detect malicious RREQ floods and avoid the forwarding of
such packets. Similar to [7], in this approach, each node
monitors the RREQ it receives and maintains a count of
RREQs received from each sender during the preset time
period. The RREQs from a sender whose RREQ rate is
above the threshold will be dropped without forwarding.
Unlike the method proposed in [7], where the threshold is
set to be fixed, this approach determines the threshold based
on a statistical analysis of RREQs. The key advantage of
this approach is that it can reduce the impact of the attack
for varying flooding rates.
Resisting flooding attacks in ad hoc networks
presented in [9] describes two flooding attacks: Route
Request (RREQ) and Data flooding attack. In RREQ
flooding attack the attacker selects many IP addresses which
are not in the network or select random IP addresses
depending on knowledge about scope of the IP address in
the network. Using neighborhood suppression, a single
threshold is set up for all neighboring nodes. In Data
flooding attack the attack node first sets up the path to all
the nodes and send useless packets. The given solution is
that the data packets are identified in application layer and
later path cutoff is initiated.
A new trust approach based on the extent of
friendship between the nodes is proposed which makes the
nodes to co-operate and prevent flooding attacks in an ad
hoc environment in [10]. All the nodes in an ad hoc network
are categorized as friends, acquaintances or strangers based
on their relationships with their neighboring nodes. A trust
estimator is used in each node to evaluate the trust level of
its neighboring nodes. The trust level is a function of various
parameters like length of the association, ratio of the number
of packets forwarded successfully by the neighbor to the
total number of packets sent to that neighbor, ratio of
number of packets received intact from the neighbor to the
total number of received packets from that node, average
time taken to respond to a route request etc. Accordingly,
the neighbors are categorized into friends (most trusted),
acquaintances (trusted) and strangers (not trusted).
To prevent RREQ flooding, the threshold level is
set for the maximum number of RREQ packets a node can
receive from its neighbors [10]. To prevent DATA flooding,
the intermediate node assigns a threshold value for the
maximum number of data packets it can receive from its
neighbors. If Xrs, Xra, Xrf be the RREQ flooding threshold
for a stranger, acquaintance and friend node respectively,
Xrf > Xra > Xrs. If Yrs, Yra, Yrf be the DATA flooding
threshold for a stranger, acquaintance and friend node
respectively then Yrf > Yra > Yrs. If the specified threshold
level is reached, further RREQ packets from the initiating
node are ignored and dropped. Thus, flooding is prevented
in the routing table.
III. PROBLEM STATEMENT
Security Attacks on Protocol Stacks
The attacks in MANET can roughly be classified into two
major categories, namely passive attacks and active attacks,
according to the attack means [8] [15]. A passive attack
obtains data exchanged in the network without disrupting
the operation of the communications, while an active attack
involves information interruption, modification, or
fabrication, thereby disrupting the normal functionality of a
MANET. Examples of passive attacks are eavesdropping,
traffic analysis, and traffic monitoring. Examples of active
attacks include jamming, impersonating, modification,
denial of service (DoS), and message replay. The attacks can
also be classified into two categories, namely external
attacks and internal attacks, according the domain of the
attacks. Some papers refer to outsider and insider attacks
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 3/2013/0081)
All rights reserved by www.ijsrd.com
721
[19]. External attacks are carried out by nodes that do not
belong to the domain of the network. Internal attacks are
from compromised nodes, which are actually part of the
network. Internal attacks are more severe when compared
with outside attacks since the insider knows valuable and
secret information, and possesses privileged access rights.
Attacks can also be classified according to network
protocol stacks. Some security attacks use stealth [18],
whereby the attackers try to hide their actions from either an
individual who is monitoring the system or an intrusion
detection system (IDS). But other attacks such as DoS
cannot be made stealth.
IV. FLOODING ATTACK
Flooding attack is a Network layer attack in which attacker
exhausts the network resources, such as bandwidth and to
consume a node’s resources, such as computational and
battery power or to disrupt the routing operation to cause
severe degradation in network performance. For example, in
AODV protocol, a malicious node can send a large number
of RREQs in a short period to a destination node that does
not exist in the network. Because no one will reply to the
RREQs, these RREQs will flood the whole network. As a
result, all of the node battery power, as well as network
bandwidth will be consumed and could lead to denial-of-
service.
A simple mechanism proposed to prevent the
flooding attack in the AODV protocol [13]. In this approach,
each node monitors and calculates the rate of its neighbors‟
RREQ. If the RREQ rate of any neighbor exceeds the
predefined threshold, the node records the ID of this
neighbor in a blacklist. Then, the node drops any future
RREQs from nodes that are listed in the blacklist. The
limitation of this approach is that it cannot prevent against
the flooding attack in which the flooding rate is below the
threshold. Another drawback of this approach is that if a
malicious node impersonates the ID of a legitimate node and
broadcasts a large number of RREQs, other nodes might put
the ID of this legitimate node on the blacklist by mistake. In
[13], the authors show that a flooding attack can decrease
throughput by 84 percent.
Similar to [13], in this approach, each node
monitors the RREQ it receives and maintains a count of
RREQs received from each sender during the preset time
period. The RREQs from a sender whose RREQ rate is
above the threshold will be dropped without forwarding.
Unlike the method proposed in [13], where the threshold is
set to be fixed, this approach determines the threshold based
on a statistical analysis of RREQs. The key advantage of
this approach is that it can reduce the impact of the attack
for varying flooding rates.
In this paper, we present a new attack, the Ad Hoc
Flooding Attack, which results in denial of service when
used against all previously on on-demand ad hoc networks
routing protocols. In this attack, the attacker either
broadcasts a lot of Route Request packets for node ID who
is not in networks so as to congest in links. To defend
routing protocols against the Ad Hoc Flooding attack, we
develop a generic secure component, called Flooding Attack
Prevention (FAP), which can be applied to AODV routing
protocol to allow that protocol to resist the rushing attack.
V. RREQ FLOOD ATTACK DETECTION ALGORITHM
Flooding unnecessary broadcast messages into the network
to disturb the normal operations of the network. A
malicious node sends a huge number of RREQ packets in an
attempt to consume the network resources. The source IP
address is forged to a randomly selected node and the
broadcast ID is intentionally increased.
In AODV protocol routes are generated on demand because
it is a reactive routing protocol. When a node wants to find a
route to a destination node, it broadcasts a Route Request
(RREQ) message with a unique RREQ ID to all its
neighbors. When a destination node receives a RREQ
message, it sends a RREP (Route Reply) message to the
source. A malicious node generates a large no. of Route
Request packets and creates congestion in the network. Due
to flooding attack, a non-malicious genuine node cannot
fairly serve other nodes due to the network-load imposed by
the fake RREQs and useless data packets. This leads to
several problems, as follows:
 Wastage of bandwidth
 Wastage of nodes’ processing time, thus increasing
the overhead
 Overflow of the routing table entries, causing
exhaustion of an important
 network resource like memory
 Exhaustion of the nodes’ battery power
 Degraded throughput
Most of the network resources are wasted in trying to
generate routes to destinations that do not exist or routes that
are not going to be used for any communication. To detect
such type of attack is very crucial in MANET because it
consume lots of network resources. Our RREQ flood attack
detection algorithm is as follows:
Algorithm for RREQ Flooding Attack
Begin
An intermediate node receives RREQ flooding packet
from node „x‟ then
1. if node „x‟ is a member and P = 1
2. if Rx < Tm
3. forward the RREQ packet and increment Rx
4. else
5. drop the RREQ packet and set P = 0
6. if node „x‟ is a guest and P = 1
7. if Rx < Tg
8. forward the RREQ packet and increment Rx
9. else
10. drop the RREQ packet and set P = 0
End
VI. CLASSIFICATION OF FLOODING DETECTION
SCHEMES
Fig. 3: DoS Attacks Classification Schemes
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 3/2013/0081)
All rights reserved by www.ijsrd.com
722
DoS detection schemes may be classified into three
categories as shown in Fig.3.
A. Based on router data structure.
B. Based on statistical analysis for packet flow.
C. Based on Artificial Intelligence (fuzzy logic and neural
network).
A. Router-Based Detection Scheme using Bloom-Filter
A bloom filter is a space-efficient data structure used in
router for pattern matching in many network
communications. It is used to inspect packets and detect
malicious packets based on many algorithms [18], [19], [20]
focuses on the low-rate agent and present a router-based
detection scheme for it.
The low rate DoS agent exploits the TCP’s slow
time scale of Retransmission Time Out (RTO) to reduce
TCP throughput. In this case, the DoS attacker can cause a
TCP flow in RTO state by sending high rate requests for
short-duration bursts. Therefore, The TCP throughput at the
victim side will be reduced during the attacking time on
low-rate DoS agent. The proposed scheme is based on the
TCP SYN-SYN/ACK protocol pairs with the consideration
of packet header information (both sequence and Ack.
Numbers). The Counting Bloom Filter (CBF) is used to
avoid the effect of ACK retransmission, and the change
point detection method is applied to avoid the dependence of
detection on sites and access patterns. See (Fig.4).
Fig. 4: Router based Counter Bloom Filter Scheme
B. Sample Flow-Statistical Analysis
Many efforts have been undertaken in using the sample flow
of statistics to detect DoS attacks [26]-[28]. [29] presented a
statistical scheme to detect the SYN-flooding accuracy on
network anomalies using flow statistics obtained through
packet sampling. The network anomalies generate huge
number of small flows, such as network scans or SYN-
flooding. Due to this reason, it is hard to detect SYN-
flooding when performing packet sampling because the
network flow may be either bursty (non-linear) or under the
normal flow rate. Their model is based on two steps: the
first step, analytical model was developed to quantitatively
evaluate the effect of packet sampling on the detection
accuracy and then investigated why detection accuracy
worsens when the packet sampling rate decreases. In
addition, it is shown that, even with a low sampling rate, the
detection accuracy was increased because the monitored
traffic was partitioned into groups. The results show that the
proposed mechanism is demonstrated to have the capability
of detecting SYN-flooding attack accurately.
According to [30], a new detection method for DoS
attack traffic based on the statistical test has been adopted.
Investigation of the statistics of the SYN arrival rate
revealed that the SYN arrival rate can be modeled by a
normal distribution. A threshold for maximum arrival rate to
detect SYN-flooding traffic has been established. In
addition, the threshold for incomplete three-way
handshaking packet ratio to detect possible DoS traffic also
has been determined. This mechanism was shown to be
effective in detecting SYN-flooding attack, but for the
normal traffic threshold, the value is not accurate for the
whole packet flow, especially during the attacking time.
C. Detection Scheme using Fuzzy Logic and Neural Nets
Fuzzy logic and neural network was adopted by many
research to design and implement intrusion detection
systems for denial of service attacks [34]-[36]. A fuzzy logic
based system for detecting SYN-flooding attacks has been
adopted. Fuzzy logic helps solving the systems which have
elements of uncertainly. Fuzzy logic is appropriate for
approaching the nonlinear systems [37]. [38] proposed a
system represented by two blocks shown in figure 5. The
first one is the packet classification block which classifies
incoming network traffic packets, where the header of each
captured packet is checked to see if it is a TCP SYN packet;
if the fragment offset value in the header is zero, and then it
is a TCP packet. If the SYN flag of the flag bits in this TCP
packet is one, then it is a SYN packet (attack possibility).
The packet classification block collects the TCP SYN
packets for a predetermined ∆t time and gives them to the
fuzzy logic system, which is the second block of the
proposed system. The ∆t in this work was 5 seconds, while
the second block of the proposed system is a fuzzy logic
system. This block is responsible for SYN-flooding attack
detection. The detection accuracy of the proposed system
was compared with Cumulative Sum (CUSUM) for five
attacks and showed a high accuracy and low false-negative
rate and generate an earlier alarm than CUSUM algorithm
which it is an ideal algorithm for identifying DoS attacks
based on the measurement for the mean in traffic before, and
after they detect comparing with the threshold value.
Fig. 5: Proposed System Based on Fuzzy Logic
VII. CONCLUSION
This distributive approach to identified the flooding attack.
The effectiveness of the proposed technique depends on the
selection of threshold values. Although, the concept of delay
queue reduces the probability of accidental blacklisting of
the node but it also delays the detection of misbehaving
node by allowing him sends more packet until delay queue
time out occurs. This works on security issues and trust
establishment schemes. A proposal to effectively detect
flooding attack using AODV Protocol is discussed. A better
understanding and modeling of the security attacks is
needed in MANETs if efficient secure routing algorithms
are to be built in the network. Future work of this research
can be optimize value of threshold and improve their
performance.
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 3/2013/0081)
All rights reserved by www.ijsrd.com
723
REFERENCES
[1]http://www.ietf.org/html.charters/manetcharter. html.
(1998-11-29).
[2] Amitabh Mishra, “Security and Quality of Service in Ad
hoc Wireless Networks,”pp. 42-57, Cambridge
University Press, 2008.
[3] Krishna Gorantala, Routing in Mobile Ad-hoc Networks.
Umea University, Sweden, Jun 2006
[4] Laura Marie Feeney, ―A taxonomy for routing
protocols in mobile ad hoc networks. Technical report,
Swedish Institute of Computer Science, Sweden, 1999.
[5] C.E. Perkins and E.M. Royer, ―Ad hoc On Demand
Distance Vector Routing. , University of California,
Santa Barbara.
[6] Elizabeth M. Royer and Chai-Keong Toh, ―A review of
current routing protocols for ad hoc mobile wireless
networks, Technical report, University of California and
Georgia Institute of Technology, USA, 1999.
[7] Ad-hoc distance vector protocol for mobile ad hoc
network
http://www.olsr.org/docs/report_html/node16.html#adh
oc_aodv#adhoc_aodv. accessed on May 2009.
[8] S. Yi and R. Kravets, Composite Key Management for
Ad Hoc Networks. Proc. of the 1st Annual International
Conference on Mobile and Ubiquitous Systems:
Networking and Services (MobiQuitous‟04), pp. 52-61,
2004.
[9] Vincent D. Park and M. Scott Corson, ―Temporally-
Ordered Routing Algorithm (TORA) Version 1:
Functional specification, Internet draft, draft-ietf-
manettora- spec-01 .txt, August 1998.
[10] E.M. Royer and Charles E. Perkins, ―Multicast
Operation of the Ad-hoc On- Demand Distance Vector
Routing Algorithm., University of California, Santa
Barbara.
[11] Rohit Dube, Cynthia D.Rais, Kuang-Yeh Wang, and
Satish K.Tripathi, ―Signal Stability- based adaptive
routing (SSA) for ad hoc mobile networks, IEEE
Personal Communications, pp. 36-45, Feb. 1997.
[12] C.E. Perkins and E.M. Royer, Ad-hoc On-Demand
Distance Vector Routing Proceedings of the 2nd IEEE
Workshop on Mobile Computing Systems and
Applications, New Orleans, LA, pp. 90-100, February
1999.
[13] Abdul Hadi Abd Rahman and Zuriati Ahmad
Zukarnain, ―Performance Comparison of AODV,
DSDV and I-DSDV Routing Protocols in Mobile Ad
Hoc Networks., European Journal of Scientific
Research, ISSN 1450-216X Vol.31 No.4, pp.566-576,
2009.
[14] P. Yi et al. “A New Routing Attack in Mobile Ad Hoc
Networks,” Int‟l. J. Info. Tech., vol. 11, no. 2, 2005.
[15] R. Oppliger, Internet and Intranet Security, Artech
House, 1998.
[16] The VINT Project, The network simulator - ns-2.
http://www.isi.edu/nsnam/ns/ .
[17] M. Jakobsson, S. Wetzel, and B. Yener, Stealth Attacks
on Ad Hoc Wireless Networks. Proc. of IEEE Vehicular
Technology Conference (VTC), 2003.
[18] M. Jakobsson, S. Wetzel, and B. Yener, Stealth Attacks
on Ad Hoc Wireless Networks. Proc. of IEEE Vehicular
Technology Conference (VTC), 2003.
[19] A. Cardenas, N. Benammar, G. Papageorgiou, and J.
Baras, Cross-Layered Security Analysis of Wireless Ad
Hoc Networks, Proc. of 24th Army Science Conference,
2004.
[20] Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu,
Mobile ad hoc networking: Imperatives and challenges.
Ad Hoc Networks I(2003)pp. 13-64, Elseiver
publications.
[21] Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection
Techniques for Mobile Wireless Networks,”
ACM/Kluwer Wireless Networks Journal (ACM
WINET), Vol. 9, No. 5, September 2003.
[22]A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion
Detection in Wireless Ad Hoc Networks,” IEEE
Wireless Communications, Vol. 11, Issue 1, pp. 48-60,
February 2004.
[23] P. Albers, O. Camp, J. Percher, B. Jouga, L. M・ and
R. Puttini, “Security in Ad Hoc Networks: a General
Intrusion Detection Architecture Enhancing Trust
Based Approaches,” Proceedings of the 1st
International Workshop on Wireless Information
Systems (WIS-2002), pp. 1-12, April 2002.
[24] O. Kachirski and R. Guha, “Effective Intrusion
Detection Using Multiple Sensors in Wireless Ad Hoc
Networks,” Proceedings of the 36th Annual Hawaii
International Conference on System Sciences
(HICSS’03), p. 57.1, January 2003.
[25] D. Sterne, P. Balasubramanyam, D. Carman, B.Wilson,
R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen,
K. Levitt, and J. Rowe, “AGeneral Cooperative
Intrusion Detection Architecture for MANETs,”
Proceedings of the 3rd IEEE International Workshop
on Information Assurance (IWIA’05), pp. 57-70, March
2005.
[26] H.–Y. Chang, S.F. Wu and Y.F. Jou, “Real-Time
Protocol Analysis for Detecting Link-State Routing
Protocol Attacks”, ACM Tran. Inf. Sys.Sec., 1, Pp. 1-36,
2001.
[27] Abdul Hadi Abd Rahman and Zuriati Ahmad
Zukarnain, ―Performance Comparison of AODV,
DSDV and I-DSDV Routing Protocols in Mobile Ad
Hoc Networks., European Journ al of Scientific
Research, ISSN 1450-216X Vol.31 No.4, pp.566-576,
2009.
[28] S. Desilva, and R. V. Boppana, “Mitigating Malicious
Control Packet Floods in Ad Hoc Networks,” Proc.
IEEE Wireless Commun. and Networking Conf., New
Orleans, LA, 2005.
[29] Yi Ping, Hou Yafei, Bong Yiping, Zhang Shiyong &
Dui Zhoulin, “Resisting Flooding Attacks in Ad Hoc
Networks”, International Conference on Information
Technology: Coding and Computing (ITCC’05)
[30] Revathi Venkataraman, M. Pushpalatha, and T. Rama
Rao, “Performance Analysis of Flooding Attack
Prevention Algorithm in MANETs”, World Academy
of Science, Engineering and Technology 56 2009
[31] L. Zong-Lin, Guang-Min, H., & Dan, Y. , "Global
abnormal correlation analysis for DDoS attack
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 3/2013/0081)
All rights reserved by www.ijsrd.com
724
detection," in IEEE Symposium on Computers and
Communications( ISCC), Marrakech, 2008, pp. 310 -
315.
[32] C. Chin-Ling, " A New Detection Method for
Distributed Denial-of-Service Attack Traffic based on
Statistical Test," Journal of Universal Computer
Science, vol. 15, pp. 488-503., 2009.
[33] L. Fang-Yie, & Chia-Chi, P., "Detecting DoS and
DDoS Attacks using Chi-Square," in Fifth International
Conference on Information Assurance and Security
(IAS), Xian, 2009, pp. 255-258.International Journal of
Distributed and Parallel Systems (IJDPS) Vol.3, No.1,
January 2012 117
[34] M. Yanchun, "System for attack recognition based on
mining fuzzy association rules," in International
Conforence On Computer Design And
Appliations,China 2010, pp. 129 -133
[35] C.-L. Tsai, et al., "Early Warning System for DDoS
Attacking Based on Multilayer Deployment of Time
Delay Neural Network," in Sixth International
Conference on Intelligent Information Hiding and
Multimedia Signal Processing, Darmstadt ; Germany,
2010, pp. 704 - 707.
[36] J. Li, et al., "DDoS Attack Detection Based On Neural
Network," in 2nd International Symposium on Aware
Computing, Taiwan, 2010, pp. 196 - 199.
[37] L. A. Zadeh, "Fuzzy sets," Information and control,
vol. 8, pp. 338-353, 1965.
[38] T. Tuncer and Y. Tatar, "Detection SYN Flooding
Attacks Using Fuzzy Logic," in International
Conference on Information Security and Assurance,
2008, pp. 321-325.
[39] L. M. Ibrahim, "Anomly Network Intrusion Detection
System Based On Distributed Time-Delay Neural
Network (DTDNN)," Journal of Engineering Science
and Technology, vol. 5, pp. 457-471, 2010.
[40] C. Jirapummin, Wattanapongsakorn, N., &
Kanthamanon, P. , "Hybrid Neural Networks for
Intrusion Detection System," Institute of Electronics,
Information and Communication Engineers (IEICE),
pp. 1-4, 2002.
[41] T. Subbulakshmi, Mercy Shalinie, S., & Ramamoorthi,
A. , "Detection and Classification of DDoS Attacks
Using Machine Learning Algorithms," European
Journal of Scientific Research, vol. 47, pp. 334-346,
2010.
[42] Z. Xia, Lu, S., Li, J., & Tang, J., "Enhancing DDoS
Flood Attack Detection via Intelligent Fuzzy Logic,"
Informatica (Slovenia), pp. 497-507, 2010.
[43] M. Norouzian, & Merati, S. , "Classifying Attacks in a
Network Intrusion Detection System Based on Artificial
Neural Networks," in 13th International Conference on
Advanced Communication Technology (ICACT), Korea,
2011, pp. 868 - 873.
[44] P.-N. Tan, Steinbach, M., & Kumar, V., Introduction to
data Mining: New York: Addison- Wesley, 2005.
[45] G. Kanwal, & Rshma, C. , "Detection of DDoS Attacks
Using Data Mining," International Journal of
Computing and Business Research (IJCBR), vol. 2, pp.
1-10., 2011.
[46] Z. Rui, & Guangxue, Y., "DDoS Detection System
Based on Data Mining," in the Second International
Symposium on Networking and Network Security
(ISNNS ’10) Jinggangshan, P. R. China, 2010 pp. 62-65.
[47] N. Hoai-Vu, & Yongsun, C., "Proactive Detection of
DDoS Attacks Utilizing k-NN Classifier in an Anti-
DDos Framework. ," in the International Journal of
Electrical and Electronics Engineering 247-252, 2010

Más contenido relacionado

La actualidad más candente

Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manetcsandit
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVIJERA Editor
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
 

La actualidad más candente (20)

Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
E41022938
E41022938E41022938
E41022938
 
B43040610
B43040610B43040610
B43040610
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manet
 
560 229-237
560 229-237560 229-237
560 229-237
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Performance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODVPerformance Evaluation of Wormhole Attack In AODV
Performance Evaluation of Wormhole Attack In AODV
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Jt3516941700
Jt3516941700Jt3516941700
Jt3516941700
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
 

Destacado

Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSRMitesh Thakore
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 

Destacado (7)

Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSR
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 

Similar a Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network

A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...IJERD Editor
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...ijtsrd
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolRisk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolIOSR Journals
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...eSAT Journals
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolZac Darcy
 

Similar a Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network (20)

A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
A Survey of various Methods of Preventing and Detecting Attacks on AODV-based...
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network Evaluation and...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing ProtocolRisk Mitigation of Black Hole Attack for Aodv Routing Protocol
Risk Mitigation of Black Hole Attack for Aodv Routing Protocol
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
C0331215
C0331215C0331215
C0331215
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...Comparison of the performance of trsaodv with aodv under blackhole attack in ...
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
B03406010
B03406010B03406010
B03406010
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing Protocol
 

Más de ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

Más de ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Último

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Último (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 719 Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network Parth C. Bhatiya 1 Hitesh M. Barot 2 1, 2 PG Student [Computer Engineering] 1 KLDRP- ITR, Gandhinagar 2 ACET, Khatraj, Gandhinagar Abstract—Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, vulnerability of nodes and channels and open medium of communication. Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to the network functionality. The Prevention methods like authentication and cryptography techniques alone are not able to provide the security to these types of networks. Therefore, efficient intrusion detection must be deployed to facilitate the identification and isolation of attacks. Major attacks on Mobile Ad hoc networks are flooding, selective forwarding, sinkhole, wormhole etc. We have presented various intrusion detection techniques in MANET. Then we have proposed a method to detect flooding attack in MANET. Keywords: MANET, flooding attack, Denial of Service (DOS), packets, route request. I. INTRODUCTION Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. MANET is a kind of wireless ad-hoc network and it is a self-configuring network of mobile routers (and associated hosts) connected by wireless links – the union of which forms an arbitrary topology. The routers, the participating nodes act as router, are free to move randomly and manage themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the larger Internet [1]. Fig. 1: Example of a simple ad-hoc network with three participating nodes In Figure 1 nodes A and C must discover the route through B in order to communicate. The circles indicate the nominal range of each node’s radio transceiver. Nodes A and C are not in direct transmission range of each other, since A„s circle does not cover C [1]. II. RELATED WORK AODV is a reactive routing protocol [6] in which the network generates routes at the start of communication. Each node has its own sequence number and this number increases when links change. Each node judges whether the channel information is new according to sequence numbers. When a node wants to find a route to a destination node, it broadcasts a Route Request (RREQ) message with a unique RREQ ID to all its neighbors. When a node receives a RREQ message, it updates the sequence number of source node and sets up reverse routes to the source node in the routing tables. If the node is the destination or the node has a valid route to the destination, it unicasts a route reply (RREP) back to the source node. The source node or the intermediate nodes that receives RREP will update its forward route to destination in the routing tables. Otherwise, it continues broadcasting the RREQ. If a node receives a RREQ message that has already processed, it discards the RREQ and does not forward it. When a link is broken, route error packets (RERR) are propagated to the source node along the reverse route and all intermediate nodes will erase the entry in their routing tables. The source node or the intermediate nodes that receives RREP will update its forward route to destination in the routing tables. Otherwise, it continues broadcasting the RREQ. If a node receives a RREQ message that has already processed, it discards the RREQ and does not forward it. In AODV, sequence number (SN) plays a role to indicate the freshness of the routing information and guarantee loop-free routes. Sequence number is increased under only two conditions: when the source node initiates RREQ and when the destination node replies with RREP. Sequence number can be updated only by the source or destination. Hop count (HC) is used to determine the shortest path and it is increased by 1 if RREQ or RREP is forwarded each hop. When a link is broken, route error packets (RERR) are propagated to the source node along the reverse route and all intermediate nodes will erase the entry in their routing tables. AODV maintains the connectivity of neighbor nodes by sending hello message periodically. Flooding RREQ packets in the whole network will consume a lot of resource of network. To reduce congestion in a network, the AODV protocol adopts some methods. A node cannot originate more than RREQ_RATELIMIT RREQ messages per second. After broadcasting a RREQ, a
  • 2. Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network (IJSRD/Vol. 1/Issue 3/2013/0081) All rights reserved by www.ijsrd.com 720 node waits for a RREP. If a route is not received within round-trip milliseconds, the node may try again to discover a route by broadcasting another RREQ, up to a maximum of retry times at the maximum TTL value. Repeated attempts by a source node at route discovery for a single destination must utilize a binary exponential back off. The first time a source node broadcasts a RREQ, it waits round-trip time for the reception of a RREP. If a RREP is not received within that time, the source node sends a new RREQ. When calculating the time to wait for the RREP after sending the second RREQ, the source node MUST use a binary exponential back off. Hence, the waiting time for the RREP corresponding to the second RREQ is 2 * round-trip time. The RREQ packets are broadcast in an incrementing ring to reduce the overhead caused by flooding the whole network. The packets are flooded in a small area (a ring) first defined by a starting TTL (time-to-live) in the IP headers. After RING TRAVERSAL TIME, if no RREP has been received, the flooded area is enlarged by increasing the TTL by a fixed value. The procedure is repeated until an RREP is received by the originator of the RREQ, i.e., the route has been found. Fig. 2: Demonstration of flooding attack [9] Simple mechanism proposed to prevent the flooding attack in the AODV protocol [7]. In this approach, each node monitors and calculates the rate of its neighbors’ RREQ. If the RREQ rate of any neighbor exceeds the predefined threshold, the node records the ID of this neighbor in a blacklist. Then, the node drops any future RREQs from nodes that are listed in the blacklist. The limitation of this approach is that it cannot prevent against the flooding attack in which the flooding rate is below the threshold. Another drawback of this approach is that if a malicious node impersonates the ID of a legitimate node and broadcasts a large number of RREQs, other nodes might put the ID of this legitimate node on the blacklist by mistake. In [8], the authors proposed an adaptive technique to mitigate the effect of a flooding attack in the AODV protocol. This technique is based on statistical analysis to detect malicious RREQ floods and avoid the forwarding of such packets. Similar to [7], in this approach, each node monitors the RREQ it receives and maintains a count of RREQs received from each sender during the preset time period. The RREQs from a sender whose RREQ rate is above the threshold will be dropped without forwarding. Unlike the method proposed in [7], where the threshold is set to be fixed, this approach determines the threshold based on a statistical analysis of RREQs. The key advantage of this approach is that it can reduce the impact of the attack for varying flooding rates. Resisting flooding attacks in ad hoc networks presented in [9] describes two flooding attacks: Route Request (RREQ) and Data flooding attack. In RREQ flooding attack the attacker selects many IP addresses which are not in the network or select random IP addresses depending on knowledge about scope of the IP address in the network. Using neighborhood suppression, a single threshold is set up for all neighboring nodes. In Data flooding attack the attack node first sets up the path to all the nodes and send useless packets. The given solution is that the data packets are identified in application layer and later path cutoff is initiated. A new trust approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate and prevent flooding attacks in an ad hoc environment in [10]. All the nodes in an ad hoc network are categorized as friends, acquaintances or strangers based on their relationships with their neighboring nodes. A trust estimator is used in each node to evaluate the trust level of its neighboring nodes. The trust level is a function of various parameters like length of the association, ratio of the number of packets forwarded successfully by the neighbor to the total number of packets sent to that neighbor, ratio of number of packets received intact from the neighbor to the total number of received packets from that node, average time taken to respond to a route request etc. Accordingly, the neighbors are categorized into friends (most trusted), acquaintances (trusted) and strangers (not trusted). To prevent RREQ flooding, the threshold level is set for the maximum number of RREQ packets a node can receive from its neighbors [10]. To prevent DATA flooding, the intermediate node assigns a threshold value for the maximum number of data packets it can receive from its neighbors. If Xrs, Xra, Xrf be the RREQ flooding threshold for a stranger, acquaintance and friend node respectively, Xrf > Xra > Xrs. If Yrs, Yra, Yrf be the DATA flooding threshold for a stranger, acquaintance and friend node respectively then Yrf > Yra > Yrs. If the specified threshold level is reached, further RREQ packets from the initiating node are ignored and dropped. Thus, flooding is prevented in the routing table. III. PROBLEM STATEMENT Security Attacks on Protocol Stacks The attacks in MANET can roughly be classified into two major categories, namely passive attacks and active attacks, according to the attack means [8] [15]. A passive attack obtains data exchanged in the network without disrupting the operation of the communications, while an active attack involves information interruption, modification, or fabrication, thereby disrupting the normal functionality of a MANET. Examples of passive attacks are eavesdropping, traffic analysis, and traffic monitoring. Examples of active attacks include jamming, impersonating, modification, denial of service (DoS), and message replay. The attacks can also be classified into two categories, namely external attacks and internal attacks, according the domain of the attacks. Some papers refer to outsider and insider attacks
  • 3. Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network (IJSRD/Vol. 1/Issue 3/2013/0081) All rights reserved by www.ijsrd.com 721 [19]. External attacks are carried out by nodes that do not belong to the domain of the network. Internal attacks are from compromised nodes, which are actually part of the network. Internal attacks are more severe when compared with outside attacks since the insider knows valuable and secret information, and possesses privileged access rights. Attacks can also be classified according to network protocol stacks. Some security attacks use stealth [18], whereby the attackers try to hide their actions from either an individual who is monitoring the system or an intrusion detection system (IDS). But other attacks such as DoS cannot be made stealth. IV. FLOODING ATTACK Flooding attack is a Network layer attack in which attacker exhausts the network resources, such as bandwidth and to consume a node’s resources, such as computational and battery power or to disrupt the routing operation to cause severe degradation in network performance. For example, in AODV protocol, a malicious node can send a large number of RREQs in a short period to a destination node that does not exist in the network. Because no one will reply to the RREQs, these RREQs will flood the whole network. As a result, all of the node battery power, as well as network bandwidth will be consumed and could lead to denial-of- service. A simple mechanism proposed to prevent the flooding attack in the AODV protocol [13]. In this approach, each node monitors and calculates the rate of its neighbors‟ RREQ. If the RREQ rate of any neighbor exceeds the predefined threshold, the node records the ID of this neighbor in a blacklist. Then, the node drops any future RREQs from nodes that are listed in the blacklist. The limitation of this approach is that it cannot prevent against the flooding attack in which the flooding rate is below the threshold. Another drawback of this approach is that if a malicious node impersonates the ID of a legitimate node and broadcasts a large number of RREQs, other nodes might put the ID of this legitimate node on the blacklist by mistake. In [13], the authors show that a flooding attack can decrease throughput by 84 percent. Similar to [13], in this approach, each node monitors the RREQ it receives and maintains a count of RREQs received from each sender during the preset time period. The RREQs from a sender whose RREQ rate is above the threshold will be dropped without forwarding. Unlike the method proposed in [13], where the threshold is set to be fixed, this approach determines the threshold based on a statistical analysis of RREQs. The key advantage of this approach is that it can reduce the impact of the attack for varying flooding rates. In this paper, we present a new attack, the Ad Hoc Flooding Attack, which results in denial of service when used against all previously on on-demand ad hoc networks routing protocols. In this attack, the attacker either broadcasts a lot of Route Request packets for node ID who is not in networks so as to congest in links. To defend routing protocols against the Ad Hoc Flooding attack, we develop a generic secure component, called Flooding Attack Prevention (FAP), which can be applied to AODV routing protocol to allow that protocol to resist the rushing attack. V. RREQ FLOOD ATTACK DETECTION ALGORITHM Flooding unnecessary broadcast messages into the network to disturb the normal operations of the network. A malicious node sends a huge number of RREQ packets in an attempt to consume the network resources. The source IP address is forged to a randomly selected node and the broadcast ID is intentionally increased. In AODV protocol routes are generated on demand because it is a reactive routing protocol. When a node wants to find a route to a destination node, it broadcasts a Route Request (RREQ) message with a unique RREQ ID to all its neighbors. When a destination node receives a RREQ message, it sends a RREP (Route Reply) message to the source. A malicious node generates a large no. of Route Request packets and creates congestion in the network. Due to flooding attack, a non-malicious genuine node cannot fairly serve other nodes due to the network-load imposed by the fake RREQs and useless data packets. This leads to several problems, as follows:  Wastage of bandwidth  Wastage of nodes’ processing time, thus increasing the overhead  Overflow of the routing table entries, causing exhaustion of an important  network resource like memory  Exhaustion of the nodes’ battery power  Degraded throughput Most of the network resources are wasted in trying to generate routes to destinations that do not exist or routes that are not going to be used for any communication. To detect such type of attack is very crucial in MANET because it consume lots of network resources. Our RREQ flood attack detection algorithm is as follows: Algorithm for RREQ Flooding Attack Begin An intermediate node receives RREQ flooding packet from node „x‟ then 1. if node „x‟ is a member and P = 1 2. if Rx < Tm 3. forward the RREQ packet and increment Rx 4. else 5. drop the RREQ packet and set P = 0 6. if node „x‟ is a guest and P = 1 7. if Rx < Tg 8. forward the RREQ packet and increment Rx 9. else 10. drop the RREQ packet and set P = 0 End VI. CLASSIFICATION OF FLOODING DETECTION SCHEMES Fig. 3: DoS Attacks Classification Schemes
  • 4. Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network (IJSRD/Vol. 1/Issue 3/2013/0081) All rights reserved by www.ijsrd.com 722 DoS detection schemes may be classified into three categories as shown in Fig.3. A. Based on router data structure. B. Based on statistical analysis for packet flow. C. Based on Artificial Intelligence (fuzzy logic and neural network). A. Router-Based Detection Scheme using Bloom-Filter A bloom filter is a space-efficient data structure used in router for pattern matching in many network communications. It is used to inspect packets and detect malicious packets based on many algorithms [18], [19], [20] focuses on the low-rate agent and present a router-based detection scheme for it. The low rate DoS agent exploits the TCP’s slow time scale of Retransmission Time Out (RTO) to reduce TCP throughput. In this case, the DoS attacker can cause a TCP flow in RTO state by sending high rate requests for short-duration bursts. Therefore, The TCP throughput at the victim side will be reduced during the attacking time on low-rate DoS agent. The proposed scheme is based on the TCP SYN-SYN/ACK protocol pairs with the consideration of packet header information (both sequence and Ack. Numbers). The Counting Bloom Filter (CBF) is used to avoid the effect of ACK retransmission, and the change point detection method is applied to avoid the dependence of detection on sites and access patterns. See (Fig.4). Fig. 4: Router based Counter Bloom Filter Scheme B. Sample Flow-Statistical Analysis Many efforts have been undertaken in using the sample flow of statistics to detect DoS attacks [26]-[28]. [29] presented a statistical scheme to detect the SYN-flooding accuracy on network anomalies using flow statistics obtained through packet sampling. The network anomalies generate huge number of small flows, such as network scans or SYN- flooding. Due to this reason, it is hard to detect SYN- flooding when performing packet sampling because the network flow may be either bursty (non-linear) or under the normal flow rate. Their model is based on two steps: the first step, analytical model was developed to quantitatively evaluate the effect of packet sampling on the detection accuracy and then investigated why detection accuracy worsens when the packet sampling rate decreases. In addition, it is shown that, even with a low sampling rate, the detection accuracy was increased because the monitored traffic was partitioned into groups. The results show that the proposed mechanism is demonstrated to have the capability of detecting SYN-flooding attack accurately. According to [30], a new detection method for DoS attack traffic based on the statistical test has been adopted. Investigation of the statistics of the SYN arrival rate revealed that the SYN arrival rate can be modeled by a normal distribution. A threshold for maximum arrival rate to detect SYN-flooding traffic has been established. In addition, the threshold for incomplete three-way handshaking packet ratio to detect possible DoS traffic also has been determined. This mechanism was shown to be effective in detecting SYN-flooding attack, but for the normal traffic threshold, the value is not accurate for the whole packet flow, especially during the attacking time. C. Detection Scheme using Fuzzy Logic and Neural Nets Fuzzy logic and neural network was adopted by many research to design and implement intrusion detection systems for denial of service attacks [34]-[36]. A fuzzy logic based system for detecting SYN-flooding attacks has been adopted. Fuzzy logic helps solving the systems which have elements of uncertainly. Fuzzy logic is appropriate for approaching the nonlinear systems [37]. [38] proposed a system represented by two blocks shown in figure 5. The first one is the packet classification block which classifies incoming network traffic packets, where the header of each captured packet is checked to see if it is a TCP SYN packet; if the fragment offset value in the header is zero, and then it is a TCP packet. If the SYN flag of the flag bits in this TCP packet is one, then it is a SYN packet (attack possibility). The packet classification block collects the TCP SYN packets for a predetermined ∆t time and gives them to the fuzzy logic system, which is the second block of the proposed system. The ∆t in this work was 5 seconds, while the second block of the proposed system is a fuzzy logic system. This block is responsible for SYN-flooding attack detection. The detection accuracy of the proposed system was compared with Cumulative Sum (CUSUM) for five attacks and showed a high accuracy and low false-negative rate and generate an earlier alarm than CUSUM algorithm which it is an ideal algorithm for identifying DoS attacks based on the measurement for the mean in traffic before, and after they detect comparing with the threshold value. Fig. 5: Proposed System Based on Fuzzy Logic VII. CONCLUSION This distributive approach to identified the flooding attack. The effectiveness of the proposed technique depends on the selection of threshold values. Although, the concept of delay queue reduces the probability of accidental blacklisting of the node but it also delays the detection of misbehaving node by allowing him sends more packet until delay queue time out occurs. This works on security issues and trust establishment schemes. A proposal to effectively detect flooding attack using AODV Protocol is discussed. A better understanding and modeling of the security attacks is needed in MANETs if efficient secure routing algorithms are to be built in the network. Future work of this research can be optimize value of threshold and improve their performance.
  • 5. Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network (IJSRD/Vol. 1/Issue 3/2013/0081) All rights reserved by www.ijsrd.com 723 REFERENCES [1]http://www.ietf.org/html.charters/manetcharter. html. (1998-11-29). [2] Amitabh Mishra, “Security and Quality of Service in Ad hoc Wireless Networks,”pp. 42-57, Cambridge University Press, 2008. [3] Krishna Gorantala, Routing in Mobile Ad-hoc Networks. Umea University, Sweden, Jun 2006 [4] Laura Marie Feeney, ―A taxonomy for routing protocols in mobile ad hoc networks. Technical report, Swedish Institute of Computer Science, Sweden, 1999. [5] C.E. Perkins and E.M. Royer, ―Ad hoc On Demand Distance Vector Routing. , University of California, Santa Barbara. [6] Elizabeth M. Royer and Chai-Keong Toh, ―A review of current routing protocols for ad hoc mobile wireless networks, Technical report, University of California and Georgia Institute of Technology, USA, 1999. [7] Ad-hoc distance vector protocol for mobile ad hoc network http://www.olsr.org/docs/report_html/node16.html#adh oc_aodv#adhoc_aodv. accessed on May 2009. [8] S. Yi and R. Kravets, Composite Key Management for Ad Hoc Networks. Proc. of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous‟04), pp. 52-61, 2004. [9] Vincent D. Park and M. Scott Corson, ―Temporally- Ordered Routing Algorithm (TORA) Version 1: Functional specification, Internet draft, draft-ietf- manettora- spec-01 .txt, August 1998. [10] E.M. Royer and Charles E. Perkins, ―Multicast Operation of the Ad-hoc On- Demand Distance Vector Routing Algorithm., University of California, Santa Barbara. [11] Rohit Dube, Cynthia D.Rais, Kuang-Yeh Wang, and Satish K.Tripathi, ―Signal Stability- based adaptive routing (SSA) for ad hoc mobile networks, IEEE Personal Communications, pp. 36-45, Feb. 1997. [12] C.E. Perkins and E.M. Royer, Ad-hoc On-Demand Distance Vector Routing Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90-100, February 1999. [13] Abdul Hadi Abd Rahman and Zuriati Ahmad Zukarnain, ―Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks., European Journal of Scientific Research, ISSN 1450-216X Vol.31 No.4, pp.566-576, 2009. [14] P. Yi et al. “A New Routing Attack in Mobile Ad Hoc Networks,” Int‟l. J. Info. Tech., vol. 11, no. 2, 2005. [15] R. Oppliger, Internet and Intranet Security, Artech House, 1998. [16] The VINT Project, The network simulator - ns-2. http://www.isi.edu/nsnam/ns/ . [17] M. Jakobsson, S. Wetzel, and B. Yener, Stealth Attacks on Ad Hoc Wireless Networks. Proc. of IEEE Vehicular Technology Conference (VTC), 2003. [18] M. Jakobsson, S. Wetzel, and B. Yener, Stealth Attacks on Ad Hoc Wireless Networks. Proc. of IEEE Vehicular Technology Conference (VTC), 2003. [19] A. Cardenas, N. Benammar, G. Papageorgiou, and J. Baras, Cross-Layered Security Analysis of Wireless Ad Hoc Networks, Proc. of 24th Army Science Conference, 2004. [20] Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks I(2003)pp. 13-64, Elseiver publications. [21] Y. Zhang, W. Lee, and Y. Huang, “Intrusion Detection Techniques for Mobile Wireless Networks,” ACM/Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, September 2003. [22]A. Mishra, K. Nadkarni, and A. Patcha, “Intrusion Detection in Wireless Ad Hoc Networks,” IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, February 2004. [23] P. Albers, O. Camp, J. Percher, B. Jouga, L. M・ and R. Puttini, “Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches,” Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002. [24] O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks,” Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’03), p. 57.1, January 2003. [25] D. Sterne, P. Balasubramanyam, D. Carman, B.Wilson, R. Talpade, C. Ko, R. Balupari, C.-Y. Tseng, T. Bowen, K. Levitt, and J. Rowe, “AGeneral Cooperative Intrusion Detection Architecture for MANETs,” Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA’05), pp. 57-70, March 2005. [26] H.–Y. Chang, S.F. Wu and Y.F. Jou, “Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks”, ACM Tran. Inf. Sys.Sec., 1, Pp. 1-36, 2001. [27] Abdul Hadi Abd Rahman and Zuriati Ahmad Zukarnain, ―Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks., European Journ al of Scientific Research, ISSN 1450-216X Vol.31 No.4, pp.566-576, 2009. [28] S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005. [29] Yi Ping, Hou Yafei, Bong Yiping, Zhang Shiyong & Dui Zhoulin, “Resisting Flooding Attacks in Ad Hoc Networks”, International Conference on Information Technology: Coding and Computing (ITCC’05) [30] Revathi Venkataraman, M. Pushpalatha, and T. Rama Rao, “Performance Analysis of Flooding Attack Prevention Algorithm in MANETs”, World Academy of Science, Engineering and Technology 56 2009 [31] L. Zong-Lin, Guang-Min, H., & Dan, Y. , "Global abnormal correlation analysis for DDoS attack
  • 6. Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network (IJSRD/Vol. 1/Issue 3/2013/0081) All rights reserved by www.ijsrd.com 724 detection," in IEEE Symposium on Computers and Communications( ISCC), Marrakech, 2008, pp. 310 - 315. [32] C. Chin-Ling, " A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test," Journal of Universal Computer Science, vol. 15, pp. 488-503., 2009. [33] L. Fang-Yie, & Chia-Chi, P., "Detecting DoS and DDoS Attacks using Chi-Square," in Fifth International Conference on Information Assurance and Security (IAS), Xian, 2009, pp. 255-258.International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012 117 [34] M. Yanchun, "System for attack recognition based on mining fuzzy association rules," in International Conforence On Computer Design And Appliations,China 2010, pp. 129 -133 [35] C.-L. Tsai, et al., "Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network," in Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt ; Germany, 2010, pp. 704 - 707. [36] J. Li, et al., "DDoS Attack Detection Based On Neural Network," in 2nd International Symposium on Aware Computing, Taiwan, 2010, pp. 196 - 199. [37] L. A. Zadeh, "Fuzzy sets," Information and control, vol. 8, pp. 338-353, 1965. [38] T. Tuncer and Y. Tatar, "Detection SYN Flooding Attacks Using Fuzzy Logic," in International Conference on Information Security and Assurance, 2008, pp. 321-325. [39] L. M. Ibrahim, "Anomly Network Intrusion Detection System Based On Distributed Time-Delay Neural Network (DTDNN)," Journal of Engineering Science and Technology, vol. 5, pp. 457-471, 2010. [40] C. Jirapummin, Wattanapongsakorn, N., & Kanthamanon, P. , "Hybrid Neural Networks for Intrusion Detection System," Institute of Electronics, Information and Communication Engineers (IEICE), pp. 1-4, 2002. [41] T. Subbulakshmi, Mercy Shalinie, S., & Ramamoorthi, A. , "Detection and Classification of DDoS Attacks Using Machine Learning Algorithms," European Journal of Scientific Research, vol. 47, pp. 334-346, 2010. [42] Z. Xia, Lu, S., Li, J., & Tang, J., "Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic," Informatica (Slovenia), pp. 497-507, 2010. [43] M. Norouzian, & Merati, S. , "Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks," in 13th International Conference on Advanced Communication Technology (ICACT), Korea, 2011, pp. 868 - 873. [44] P.-N. Tan, Steinbach, M., & Kumar, V., Introduction to data Mining: New York: Addison- Wesley, 2005. [45] G. Kanwal, & Rshma, C. , "Detection of DDoS Attacks Using Data Mining," International Journal of Computing and Business Research (IJCBR), vol. 2, pp. 1-10., 2011. [46] Z. Rui, & Guangxue, Y., "DDoS Detection System Based on Data Mining," in the Second International Symposium on Networking and Network Security (ISNNS ’10) Jinggangshan, P. R. China, 2010 pp. 62-65. [47] N. Hoai-Vu, & Yongsun, C., "Proactive Detection of DDoS Attacks Utilizing k-NN Classifier in an Anti- DDos Framework. ," in the International Journal of Electrical and Electronics Engineering 247-252, 2010