International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 108    Submit Your Rating     Cite This   Download        Certificate

TRACE BACK TECHNIQUE AGAINST DDOS ATTACK ON WIRELESS SENSOR NETWORK

    3 Author(s):  PRIYA PANDEY, MANEELA JAIN, RAJNEESH PACHOURI

Vol -  8, Issue- 12 ,         Page(s) : 10 - 18  (2017 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

The attack classification criteria in WSNs is even more difficult. After analyzing existing frameworks, we have found three types of DDOS frameworks: victim-end defense frameworks, source-end defense frameworks, and distributed defense frameworks. It is too late for victim-end defense frameworks to respond to DDOS attacks. A source-end defense framework cannot achieve good performance due to lack of attack information. In contrast, a distributed framework can achieve better performance by cooperating among distributed multiple defense subsystems. We propose trace back methodologies to control unwanted traffic by mitigating flooding based DDOS attacks. The work concentrates mainly on the detection algorithm should detect a DDOS attack at the originating source with high reliability.

1. Huang, Qiang, JohnasCukier, Hisashi Kobayashi, Bede Liu, and Jinyun Zhang. "Fast authenticated key establishment protocols for self-organizing sensor networks." In Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, pp. 141-150. ACM, 2003.
2. Latif, Rabia, Haider Abbas, and Saïd Assar. "Distributed denial of service (DDoS) attack in cloud-assisted wireless body area networks: a systematic literature review." Journal of medical systems 38, no. 11 (2014): 128.
3. Lupu, Teodor-Grigore, I. Rudas, M. Demiralp, and N. Mastorakis. "Main types of attacks in wireless sensor networks." In WSEAS International Conference. Proceedings. Recent Advances in Computer Engineering, no. 9. WSEAS, 2009.
4. Redwan, Hassen, and Ki-Hyung Kim. "Survey of security requirements, attacks and network integration in wireless mesh networks." In New Technologies, Mobility and Security, 2008. NTMS'08., pp. 1-5. IEEE, 2008.
5. Li, Wenchao, Ping Yi, Yue Wu, Li Pan, and Jianhua Li. "A new intrusion detection system based on KNN classification algorithm in wireless sensor network." Journal of Electrical and Computer Engineering 2014 (2014). Harvard
6. Khan, Shafiullah, Kok-Keong Loo, Tahir Naeem, and Mohammad Abrar Khan. "Denial of service attacks and challenges in broadband wireless networks." 8; 7 (2008).
7. Oreku, George S., Jiangzhong Li, and Tamara Pazynyuk. "An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos)." In Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 81-83. ACM, 2007.
8. Rassam, Murad A., MohdAizainiMaarof, and Anazida Zainal. "A survey of intrusion detection schemes in wireless sensor networks." American Journal of Applied Sciences 9, no. 10 (2012): 1636.
9. Seufert, Stefan, and Darragh O'Brien. "Machine learning for automatic defence against distributed denial of service attacks." In Communications, 2007. ICC'07. IEEE International Conference on, pp. 1217-1222. IEEE, 2007.
10. Salmon, Helio Mendes, Claudio M. De Farias, Paula Loureiro, Luci Pirmez, Silvana Rossetto, Paulo Henrique de A. Rodrigues, Rodrigo Pirmez, Flávia C. Delicato, and Luiz Fernando R. da Costa Carmo. "Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques." International journal of wireless information networks 20, no. 1 (2013): 39-66.
11. Modares, Hero, RosliSalleh, and Amirhossein Moravejosharieh. "Overview of security issues in wireless sensor networks." In Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on, pp. 308-311. IEEE, 2011.
12. Shamshirband, Shahaboddin, Ahmed Patel, Nor BadrulAnuar, Miss Laiha Mat Kiah, and Ajith Abraham. "Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks." Engineering Applications of Artificial Intelligence 32 (2014): 228-241.
13. Arunmozhi, S. A., and Y. Venkataramani. "DDoS Attack and Defense Scheme in Wireless Ad hoc Networks."  1106.1287 (2011).
14. Nanda, Rohan, and P. Venkata Krishna. "Mitigating denial of service attacks in hierarchical wireless sensor networks." Network security 2011, no. 10 (2011): 14-18.
15. Jan, Mian, Priyadarsi Nanda, Muhammad Usman, and Xiangjian He. "PAWN: a payload-based mutual authentication scheme for wireless sensor networks." Concurrency and Computation: Practice and Experience (2016).
16. ELBeltagy, Maha, Sarah Mustafa, JariyaUmka, Laura Lyons, Ahmed Salman, Chur-Yoe Gloria Tu, Nikita Bhalla, Geoffrey Bennett, and Peter M. Wigmore. "Fluoxetine improves the memory deficits caused by the chemotherapy agent 5-fluorouracil." Behavioural brain research 208, no. 1 (2010): 112-117.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details