Skip to main content

Detection of RREQ Flooding Attacks in MANETs

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 847))

Abstract

Mobile Ad hoc Networks (MANETs) are prone to vulnerabilities as a result of lack of centralized management, dynamic topologies, and predefined boundary. There are many attacks that affect the performance of MANETs. Flooding attack is a Denial of Service attack, also known as DoS attack that brings down the network by flooding with a huge amount of route request (RREQ) packets, routed to a destination that does not exist. This paper proposes a robust detection system; a Fuzzy-based Flooding Attack Detection System (FFADS) using a first-order Mamdani-type fuzzy inference system to detect RREQ flooding attacks. This proposed system uses network-specific parameters rather than node-specific factors. Comprehensive simulations are carried out to observe the variations of input parameters with respect to the flooding level of the system. The simulation results reveal that any deviation from the normal behavior of nodes is immediately detected by the proposed system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ullah, Z., Khan, M.S., Ahmed, I., Javaid, N., Khan, M.I.: Fuzzy-based trust model for detection of selfish nodes in MANETs. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, pp. 965–972 (2016)

    Google Scholar 

  2. Chaudhary, A., Tiwari, V., Kumar, A.: A novel intrusion detection system for ad hoc flooding attack using fuzzy logic in mobile ad hoc networks. In: International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), Jaipur, pp. 1–4 (2014)

    Google Scholar 

  3. Patel, M., Sharma, S.: Detection of malicious attack in MANET a behavioral approach. In: 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, pp. 388–393 (2013)

    Google Scholar 

  4. Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Gaiti, D.: Flooding attacks detection in MANETs. In: 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, pp. 1–6 (2015)

    Google Scholar 

  5. Choudhury, P., Nandi, S., Pal, A., Debnath, N.C.: Mitigating route request flooding attack in MANET using node reputation. In: IEEE 10th International Conference on Industrial Informatics, Beijing, pp. 1010–1015 (2012)

    Google Scholar 

  6. Geetha, K., Sreenath, N.: Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol. Arab. J. Sci. Eng. 41, 1161 (2016)

    Article  Google Scholar 

  7. Chouhan, N.S., Yadav, S.: Flooding attacks prevention in MANET. Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 1(3) (2013)

    Google Scholar 

  8. Bhalodiya, S., Balakrishnan, V., Chauhan, R., Chouhan, N.S., Fitri, M.H., Ghonge, M.M., Hong, F., Jawandhiya, P.M., Joshi, K., Lomte, V., Murthy, S.R., Pushpalatha, M., Rai, M.K., Song, J., Tupakula, U., Vaghela, K., Varadharajan, V., Venkataraman, R.: Enhanced detection and recovery from flooding attack in MANETs using AODV routing protocol (2015)

    Google Scholar 

  9. Sathish, T., Sasikala, E.: Dynamic profile based technique to detect flooding attack in MANET. Int. J. Innov. Res. Comput. Commun. Eng. 2(1) (2014)

    Google Scholar 

  10. Guo, Y., Gordon, S., Perreau, S.: A flow based detection mechanism against flooding attacks in mobile ad hoc networks. In: 2007 IEEE Wireless Communications and Networking Conference, Kowloon, pp. 3105–3110 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Nithya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nithya, B., Nair, A., Sreelakshmi, A.S. (2019). Detection of RREQ Flooding Attacks in MANETs. In: Jain, L., E. Balas, V., Johri, P. (eds) Data and Communication Networks. Advances in Intelligent Systems and Computing, vol 847. Springer, Singapore. https://doi.org/10.1007/978-981-13-2254-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2254-9_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2253-2

  • Online ISBN: 978-981-13-2254-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics