Smart detection and prevention procedure for DoS attack in MANET

A. Muntaheen, Milton Chandro Bhowmick, Md. Raqibul Hasan Rumman, Nayeem Al-Tamzid Bhuiyan, Md. Taslim Mahmud Bhuyain, Md. Rakibul Islam, Md. Babar Ali Bhuyan, Md Sahadat Hossain Sagor, Md. Murshadul Hoque, Md. Majharul Islam, M. Hasan
{"title":"Smart detection and prevention procedure for DoS attack in MANET","authors":"A. Muntaheen, Milton Chandro Bhowmick, Md. Raqibul Hasan Rumman, Nayeem Al-Tamzid Bhuiyan, Md. Taslim Mahmud Bhuyain, Md. Rakibul Islam, Md. Babar Ali Bhuyan, Md Sahadat Hossain Sagor, Md. Murshadul Hoque, Md. Majharul Islam, M. Hasan","doi":"10.25081/RRST.2021.13.6848","DOIUrl":null,"url":null,"abstract":"A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any preestablished fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.","PeriodicalId":20870,"journal":{"name":"Recent Research in Science and Technology","volume":"3 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Research in Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25081/RRST.2021.13.6848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any preestablished fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
城域网中DoS攻击的智能检测和预防程序
一种包含移动节点集合的自组织无线通信短时网络是移动自组网(MANET)。移动节点通过无线无线电链路相互通信,无需使用任何预先建立的固定通信网络基础设施或集中管理,例如基站或接入点,并且无需人为干预。此外,该网络在会议、救灾和战场场景中具有潜在的应用前景,近年来受到了人们的重视。有一些安全问题增加了对移动自组织网络攻击的恐惧。与传统的有线和无线网络相比,MANET中节点的移动性带来了许多安全问题,容易受到不同类型的安全攻击。造成这些问题的原因是由于它们的开放介质、动态网络拓扑、缺乏中央管理、分布式协作、能力受限以及缺乏明确的防线。如果没有适当的安全措施,移动主机很容易被恶意节点捕获、破坏和攻击。恶意节点的行为可能会故意破坏网络,使整个网络遭受丢包之苦。移动自组织网络中的一个主要问题是流量DoS攻击,在这种攻击中,流量被恶意节点阻塞,拒绝为用户提供网络服务。移动自组织网络必须有安全的传输和通信路径,这是一个严肃的测试和必不可少的问题。为了提供安全的通信和传输,科学家对多功能即兴组织的安全问题进行了明确的研究,提出了许多网络内的安全指挥约定和安全措施。这项工作的目标是研究DoS攻击以及如何在网络中检测到它。现有的查找导致交通阻塞的恶意节点的方法是基于节点的保留值。该方法利用广播可靠性报文(RL packet)确定的可靠性值来发现恶意节点。在该方法中,在初始阶段,每个节点的可靠性值为零,特定的时间片,并以一个称为可靠性数据包的数据包开始传输,在特定时间内响应正确的节点增加其可靠性值,在特定时间内响应不正确的节点降低其可靠性值,如果小于零则宣布为恶意节点。可靠性方法考虑了服务的可用性和重传时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exploring diverse aspects of celiac disease - A review Regulation of cell proliferation and tumor suppressor roles of microRNA 329-3p of the MAP kinase pathway in cervical squamous carcinoma Insights into ancient ceramic technology: a comprehensive analysis of mineralogy, chemistry and firing conditions Insights into ancient ceramic technology: a comprehensive analysis of mineralogy, chemistry and firing conditions Feasibility study on formulation of cutting fluid from waste palm oil
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1