Skip to main content

A Comparative Study of DoS Attack Detection and Mitigation Techniques in MANET

  • Conference paper
  • First Online:
Book cover Social Networking and Computational Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 100))

  • 688 Accesses

Abstract

Mobile ad hoc network is a self-configured, decentralized, constellation of machines that together form architecture less movable network. Because of dynamic changing nature of the network, it is more prone to various attacks. DDoS attacks are the major security risk on mobile ad hoc networks (MANET). DDoS attacks have the tendency to make large volume of unauthorized traffic, due to which the legitimate users cannot use the resources. In this work, various DDoS detection and mitigation techniques have been analyzed. This work has abridged various types of DDoS techniques and attack detection methods. It has also identified advantages and disadvantages of various DDoS defense mechanisms. Volumes of academic research have been discussed that depicts a diverse array of methodologies in detecting, preventing, and mitigating the impact of DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sandoval G, Wolverton T (2000) Leading web sites under attack. Tech Report. CNET News Tech Rep. TR 2100–1017, 9 Feb 2000

    Google Scholar 

  2. Gordon LA, Loeb MP, Lucyshyn W, Richardson R (2004) 2004 CSI/FBI computer crime and security survey. Computer Security Institute, San Francisco, CA

    Google Scholar 

  3. Dobbins R, Morales C (2010) Worldwide infrastructure security report. Arbor Networks Annual Survey

    Google Scholar 

  4. http://www.neustar.biz/enterprise/resources/ddos-protection/2012ddosattackreport#.UlT_otdR5DI

  5. http://www.itproportal.com/2013/07/31/ddos-attacks-rise-dramatically-first-half-2013

  6. Kumar S, Varalakshmi G (2011) Detection of application layer DDoS attack for a popular website using delay of transmission. Int J Adv Eng Sci Technol 10(2):181–184

    Google Scholar 

  7. Douligeris C, Mitrokotsa A (2004) DDoS attacks and defense mechanisms: classification and state of the art. Comput J Netw 44(5):643–666

    Article  Google Scholar 

  8. Chauhan G, Nandi S (2008) QoS aware stable path routing (QASR) protocol for MANETs. In: First international conference on emerging trends in engineering and technology, pp 202–207

    Google Scholar 

  9. Jun JH, Oh H, Kim SH (2011) DDoS flooding attack detection through a step-by-step investigation. In: IEEE 2nd international conference on networked embedded systems for enterprise applications. ISBN: 978-1-4673-0495-5

    Google Scholar 

  10. Erickson J (2008) Hacking—the art of exploitation (2nd edn.). No Starch Press Inc., San Fancisco, CA, p 50, p 250–258

    Google Scholar 

  11. Singh A Demystifying denial-of-service attacks. Part one. A report on symantec site

    Google Scholar 

  12. Goodrich M, Tamassia R (2011) Introduction to computer security. Morgan Kaufmann Publishers, Boston, MA, pp 256–260

    Google Scholar 

  13. Carl C, Kesidis G, Brooks RR, Rai S (2010) Denial-of-service attack-detection techniques. IEEE Internet Comput 82–89

    Article  Google Scholar 

  14. www.cert.org

  15. Lai WS, Lin CH, Liu JC, Huang HC, Yang TC (2008) Using adaptive bandwidth allocation approach to defend DDoS attacks. Int J Softw Eng Its Appl 2(4):61–72

    Google Scholar 

  16. Mehfuz S, Doja MN (2008) Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs. J Artif Evol Appl

    Google Scholar 

  17. Arunmozhi SA, Venkataramani Y (2011) DDoS attack and defense scheme in wireless ad hoc networks. Int J Netw Secur Its Appl (IJNSA) 3(3). https://doi.org/10.5121/ijnsa.2011.3312

    Article  Google Scholar 

  18. Wu X, Yau DKY (2006) Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game theoretic approach. In: Proceedings of the 2nd ACM symposium on information, computer and communication security, pp 365–367

    Google Scholar 

  19. Rao SRS (2011) Denial of service attacks and mitigation techniques: real time implementation with detailed analysis. SANS Institute

    Google Scholar 

  20. Xu X, Wei D, Zhang Y (2011) Improved detection approach for distributed denial of service attack based on SVM. IEEE 978-1-4577-0856

    Google Scholar 

  21. Mishra A, Gupta BB, Joshi RC (2011) A comparative study of distributed denial of service attacks, intrusion tolerance and mitigation techniques. In: EISIC’11 Proceedings-European intelligence and security informatics conference pages pp 286–289. IEEE Computer Society Washington, DC, USA ISBN: 978-0-7695-4406-9

    Google Scholar 

  22. Michalas A, Komninos N, Prasad NR (2011) Mitigate DoS and DDoS attack in mobile ad hoc networks. Int J Digit Crime Forensics 3(1):14–36

    Article  Google Scholar 

  23. Kim Y, Helmy A (2009) CATCH: a protocol framework for cross-layer attacker traceback in mobile multi-hop networks. Elsevier

    Google Scholar 

  24. Kim Y, Helmy A (2006) Attacker traceback with cross-layer monitoring in wireless multi-hop networks. SASN’06, 30 Oct 2006

    Google Scholar 

  25. Ye J, Cheng X, Zhu J, Feng L, Song L (2018) A DDoS attack detection method based on SVM in software defined network. Hindawi, Secur Commun Netw 2018, Article ID 9804061, p 8

    Google Scholar 

  26. Noh S, et al (2003) Detecting distributed denial of service (DDoS) attacks through inductive learning. LNCS 2690, pp 286–295

    Google Scholar 

  27. Mankins D, Krishnan R, Boyd C, Zao J, Frantz M (2001) Mitigating distributed denial of service attacks with dynamic resource pricing. IEEE

    Google Scholar 

  28. Mukhopadhyay D, Oh BJ, Shim SH, Kim YC (2010) A study on recent approaches in handling DDoS attacks. Cornell University Library

    Google Scholar 

  29. Lipson HF (2002) Tracking and tracing cyber-attacks: technical challenges and global policy issues. CERT Coordination Center, Special Report: CMU/SEI-2002-SR-009

    Google Scholar 

  30. Thatte G, Mitra U, Heidemann J (2005) Detection of low-rate attacks in computer networks. University of Southern California IEEE

    Google Scholar 

  31. Ansari A, Waheed MA (2017) Flooding attack detection and prevention in MANET based on cross layer link quality assessment. In: 2017 international conference on intelligent computing and control systems (ICICCS). Electronic ISBN: 978-1-5386-2745-7, IEEE

    Google Scholar 

  32. Fakieh KA (2016) An overview of DDoS attacks detection and prevention in the cloud. Int J Appl Inf Syst (IJAIS)—ISSN: 2249–0868, Foundation of Computer Science FCS, New York, USA, 11(7), December 2016. www.ijais.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Divya Gautam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gautam, D., Tokekar, V. (2020). A Comparative Study of DoS Attack Detection and Mitigation Techniques in MANET . In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_50

Download citation

Publish with us

Policies and ethics