SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 7, No. 2, April 2017, pp. 919~925
ISSN: 2088-8708, DOI: 10.11591/ijece.v7i2.pp919-925  919
Journal homepage: http://iaesjournal.com/online/index.php/IJECE
Security Measure to Detect and Avoid Flooding Attacks using
Multi-Agent System in MANETS
Bandana Mahapatra, Srikanta Patnaik
Departement of Computer Science Engineering, Siksha O Anusandhan University, India
Article Info ABSTRACT
Article history:
Received Dec 9, 2016
Revised Mar 14, 2017
Accepted Mar 30, 2017
Security is considered as one of the major challenge when it comes to
infrastructure less and self dependent network without any centralized
control. The vulnerability of Adhoc Network makes it susceptible to external
attacks like flooding of hello messages or propagating fake routing messages
etc. Such attacks generates a variety of problems like disturbing the network
by flooding messages that results in waste of battery which is a vital resource
to maintain the life span of the network. Most importantly cause agents to die
when unable to reach destination due to fake routing messages causing a
heavy loss on part of the nodes generating them to maintain the route
knowledge. The paper proposes a novel technique to identify the flooding
attack and measure to overcome them using Multi-Agent system
Keyword:
AdHoc network system
External attack in MANET
Flooding attacks
Optimal agents in multi-agent
system Copyright © 2017 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Bandana Mahapatra,
Computer Science & Engineering Dept.,
Siksha „O‟ Anusandhan University,
Bhubaneswar, India.
Email: bandana11@gmail.com
1. INTRODUCTION
The Adhoc Network is a system of wireless mobile nodes where a group of nodes within close
proximity make a network. Such an infrastructure less and self configured network, on account of
unavailability of a proper centralized control and limited resources remains vulnerable to attacks [1]. The
attack types can be broadly classified into either an external attack or an internal attack. In external attack,
attacker target the network medium to disrupt the normal network flow. The typical examples of external
attack can be flooding of messages or propagation of fake routing messages that give rise to Denial of
Service Attack. The prevention mechanisms available to avoid such attack types in traditional network are
membership authentication, firewall which fails to work due to unstable network medium and frequent
topology changes [2]. The volatile topology of MANETS demands concern of the researchers to formulate a
proper routing scheme to achieve resilient and an effective communication among the nodes.
Mobile Agents are independent route search messages that practically goes around the network from
one node to another and update the routing table according to the nodes they visit till they reach
destination [3], [4]. This technique as a solution could not prove effective when the network scales up
moreover single dependent route as a communication medium posed problems like improper load balancing,
unreliable route to depend upon as well as lack of alternative routes available. Multi Agent system solved
efficiently load balancing problem as well as provided alternative solution but increased the computational
overhead on part of the node while generating agents or causing increase in overall network traffic by
launching multiple routing messages as Agents [5]. Therefore launching of huge number of Agents to
maintain the network traffic tends to result in increase of network traffic as well as reduced lifetime of a node
affecting the overall network. Hence this demands the need to quantify optimal number of nodes suitable for
a particular network topology for a particular time [6]. Each agents launched incur additional cost on the
 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 919 – 925
920
node hence death of an agent due to flooding attacks can be considered as a heavy loss on the part of the
node.
The paper provides a novel technique of quantifying the optimal number of agents to be launched
for route search, checking for possibilities of flooding attack in the network, identifying malicious nodes and
taking effective measures to block the node while using alternative routes provided by multiple agents to
maintain the flexible and robust communication network flow [7], [8].
2. RELATED PAPERS
Romit roy Choudhury, S. Bandyopadhyay and Krishna Paul [9] proposed a distributed Mechanism
for Topology discovery in Ad Hoc Wireless Networks Using Mobile Agents where they have defined a
concept of information aging on link affinity based on which a predictive algorithm running on each node
can predict the current Network topology based on the current Network information stored at that node. Link
affinity, associated with a link between two nodes n and m, is a prediction about span of life of that link in a
particular context. They have applied this notion to predict topology by each node and thus be cautious
before data transfer is initiated.
Ryokichi Onishi Samyasu Yamaguchi, Hirao Ki Morino Hitoshio Aida Jadosaito proposed “The
Multi Agent System for Dynamic Network Routing”. They proposed that by multiplying each entry in
routing table to store much more information from Agents evaluating them to make better use of information
succeeded in rating the Network continuously by 40%. They also suggested that Agents themselves are often
written in relatively slow interpreted languages and slightly gain weight for containing code. However if the
entire system saves more bandwidth resource for control and reacts more quickly these overheads of Agents
might be acceptable.
Bounpadith Kannhovong, Hidehisa Nakayama, Yoshiaki Nemoto, and Neikato [10] have conducted
a survey on the state of the art of security issues in Manet. They have examined routing attacks like link
spoofing, colluding miserly attacks and defense mechanisms against such attacks in existing MANET
protocols.
Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong in their paper [11] have designed a generic
defense against the Adhoc Flooding Attack in mobile Adhoc Network. Their designed mechanism aims at
recording the rate of route_request message. Once the threshold is exceeded nodes deny any further request
packets from the intruder.333.
Meenakshi Patel, Sanjay Sharma, Divya Sharan have proposed in their paper [12] the mechanism
for detection and prevention of Flooding Attack using SVM. They have schemed a new method based on
AODV behavioral metrics for detecting and preventing Flooding Attacks in MANETS. They have used the
PDER, Co and PMIR as metrics to predict the Flooding attacks.
3. DETECTING AND AVOIDING FLOODING ATTACK USING MULTIPLE AGENTS
The paper aims at providing a technique to detect flooding attacks in the buffer and use alternative
routes to maintain a resilient network.
ALGORITHM – 1
TO DETECT AND AVOID FLOODING ATTACKS
Start
Step1. Set Nearest_neighbor =no of hello_msg
Step2. Calculate
Agents to be launched =nearest_neighbour/2
Counter = Counter + 1
Step3. Launch agents in network
Step4. If flooding_attack = = yes
Malicious_node = node_id
//Check memory route table
Step5. For i = 1to N // N is no of rows in route table
If Table [i] = Malicous_node as intermediate node
Table[i] = Table[i+1].
End
Algorithm-1represents the procedure adopted by the proposed model for detection of Flooding
Attacks and measures adopted to avoid it which is shown as Figure 1. The Figure 1 shows the proposed
model consisting of 3 main modules. Module1 is generating optimal number of agents, module2 is about
IJECE ISSN: 2088-8708 
Security Measure to Detect and Avoid Flooding Attacks Using Multi Agent System .... (Bandana Mahapatra)
921
detection of flooding attacks in buffer and module 3 deals with measures to avoid flooding attacks and
maintaining a resilient network.The node first calculates the optimal number of Agents to be launched in the
network considering the current topology or network scenario [5].
Module 2
Module 1
Module 3
Figure 1. Proposed Node Architecture for Detecting and avoiding flooding attacks
These agents move around from one node to other node in search of the destination while keeping a
track of the node they visit during their search period. These agents return back to the original node once they
reach the destination using the same route. These messages are received by the node and are accumulated in
the incoming message buffer where the occurrence of flooding attack is checked in the buffer itself so as to
prevent wastage of power in reading same message again.
The detection of flooding attack is dealt by blocking the node generating malicious messages and
discarding all the routes that has the malicious node as an intermediary node to reach destination. The
multiple agents here collect different available routes from a source to destination that helps node to maintain
the communication network as well as the connectivity that makes it a resilient or a robust network capable
of handling flooding attacks.
3.1. Optimal number of Agents
The wireless Ad Hoc Network when scaled up it becomes challenging for the normal wireless
routing protocols to keep the Network Routing information current. Hence the Agents become necessary
once the Network size is huge. But a Single Agent Network also has its short comings like improper load
balancing and only a single communication route to reach from source to destination which is also not
dependable due to Ad Hoc nature of the Network. This problem can be addressed by using multiple agent in
the Network for communication. Multi-Agents launched in the network though helps increasing the number
of received nodes and throughput also increases the computational overhead and network bandwidth.
Moreover continuous growth in number of agents becomes a bottleneck with no significant improvement
brought on the network performance. This demands launch of optimal number of Agents in the network
considering the variable constraints like number of received packets, dropped packets, Normalized Routing
Overload, computational overhead, etc [7].
Constrained optimization is the process of optimizing an objective function with respect to some
variables in the presence of those variables. Minimum of constrained non linear multivariable function is a
gradient based method that is designed to work where objective function and the constraint function are both
continuous first derivatives. It uses a sequential quadratic programming (SQP) method, where the function
solves a quadratic programming sub problem at each iteration. It may be calculated as – Min ƒ(x) such that:
Generate
optimal
number of
nodes
Incoming
message
buffer
Alternative
available
routes
Check for
Flooding
Attacks
Update
routes in
memory
Identify malicious
node & block its
incoming message
Remove
routes
with
malicious
node
Network
 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 919 – 925
922
{
( )
( )
3.2. Detection of Flooding attacks in Buffer
Flooding is a denial of service attack designed to degrade the performance of the network or node by
flooding it with large amount of traffic flood. Attacks occur when a network or service becomes weight down
with packets initiated incomplete connection requests that it can no longer process a genuine connection
requests. By flooding a server or host with connections that cannot be completed, the flood attack eventually
fills the host memory buffer. Once this buffer is full no further connections can be made and result is Denial
of Services [7], [8].
The proposed Knowledge Based model consists of a buffer that receives the incoming messages and
the signature module that comprises of message signatures that are categorized as Flooding attack and are
subsequently blocked. The incoming messages are first received by the buffer and are pattern matched with
the signature module to see if the message is sent by a malicious node creating Syn-Flood attack. If the
message is a non match then it is rechecked within the buffer for tracing the possibility of Attack. If the
message is found to be repeated beyond a certain threshold, the message is updated in the signature module
categorizing it as DoS attack pattern.
Incoming Messages
(Pattern Matching)
N Y(update signature block)
(Message rechecked for duplication)
Figure 2. Proposed Model for detecting Syn-Flood Attacks in Buffer
ALGORITHM -2
ALGORITHM TO DETECT FLOODING
ATTACKS IN BUFFER
Start
Set Threshold T
Incoming Message→ Buffer
If Message == signatures in memory
Counter = Counter + 1
Else
Set i = 1
While (Buffer ≠ NULL)
If Buffer [0] == Buffer[i]
Buffer[0] → Signatures in memory
Delete Msg[Buffer[0]]
Else i= i+1
If counter > Threshold
Block the rotes with node_id in the memory
Buffer
End
…
Signature of MSG
with multiple
copies in buffer
Counter =
Counter +1
If
counte
r>T
Flooding Attack
IJECE ISSN: 2088-8708 
Security Measure to Detect and Avoid Flooding Attacks Using Multi Agent System .... (Bandana Mahapatra)
923
3.3. Measures to Avoid Flooding Attacks and Maintain a resilient Network
This module is capable of both identifying malicious nodes as well as taking preventive measures to
avoid such attack maintaining a robust and resilient network. Once the message buffer encounters a repeated
message pattern beyond the threshold levels, the node id of the malicious node sending messages is identified
and all further messages from the node is blocked. The routes available with the node having the malicious
node as an intermediate one is blocked and alternative routes available through multi agents is used for
message communication between the source and destination node.
4. EXPERIMENTAL RESULTS
In this work we have analyzed the behavior of varying number of Agents across different network
topologies. Here the constraints effecting the overall network performance is considered while quantifying
the approx-optimal number of Agents. The constraints effecting the network performance considered are
computational overhead on nodes, Normalized Routing Overload, and throughput of the Network.
The Figure 3 shows the impact of change in number of Agents launched in the network on different
constraints involved in determining the overall network performance hence also determining the aprox
optimal number of agents to be launched in the network by a node where the variable 1 is the throughput, 2 is
normalised routing overload and 3 is the computational overhead incured upon nodes. Using Trust Regeon
Reflective Algorithm and F-Mincon-Constrained non-lenear minimization the perito Optimal Solution for
Aprox optimal number of Agents that gives maximum benefit to the network is obtained, shown in Figure 4.
Figure 3. Impact on Constraints due to change in
number of Agents Launched
Figure 4 . Perito Optimal Solution obtained from
Trust Region Algorithm
Figure 5. Knowledge Based method Vs AODV
protocol
Figure 6. Alarms Generated in the Knowledge based
model of Flood Detection
We simulated the proposed algorithm in NS-2 environment using AODV protocol. The results
obtained as projected in the Figure 5 shows a significant improvement in detection of Flooding Attacks
1 2
Flood Detection
Techniques
0
10
20
30
40
50
60
70
80
90
Atta
c
k
D
et
e
ct
e
d
%
a
g
e
1- Knowledge
base -
2- AODV
 ISSN: 2088-8708
IJECE Vol. 7, No. 2, April 2017 : 919 – 925
924
generated in the network in comparison to AODV protocol. Figure 6 shows the increase in true positive along
with reduction of false positive generated in the network [4]. The true positive leads next to the knowledge
base updating thus enabling the signature updation dynamically which is advantageous to the MANETs, that
are themselves dynamic in nature and are equipped with limited resources to rely upon, hence demands
continuous signature to be updated.
4.1. Result Analysis
The proposed knowledgebase DoS detection model simulated gives a rise in throughput by 37.33%
and increases the packet delivery ratio as shown in the Figure 5 as well as reduces the end to end delay giving
a significant improvement over the network performance. Figure 7 and 8 shows the Normal Routing overload
and Overall Packets Dropped in an attack scenario. The results shows a significant improvement in
maintaining a resilient network suffering from very low packet drop due to Syn-Flood attack condition in a
network having multiple nodes supporting multiple number of Agents.
Figure 7. Normalized Routing Overload for the
Scaled Network
Figure 8. Overall Packets dropped in an attack
condition
5. CONCLUSION
In the present study we have discussed regarding the Syn-Flood Attack and how dropping or a
failure of agents due to heavy network traffic is a heavy loss incurred upon the nodes as well as the network
medium as a whole. Thereafter we have proposed a model that would detect the syn-flood attack in the buffer
itself saving the energy wastage in processing of such messages as well as generating optimal number of
agents so as to keep the network medium traffic low. The model also maintains a robust communication
medium while identifying and blocking routes through the malicious node. Further a study on the behavior of
the agents launched into the network has been conducted which provides us with a parito optimal number
giving us the most beneficial number of agents to be launched. The proposed algorithm of the model has
been tested across NS2 medium that gave us the reduced number of drop of packets by 74% and improved
NRL of the network. the proposed algorithm, has shown an increase in number of Syn-Flood attack detection
by 37% along with increase in rate of true positive alarms generated in the node.
REFERENCES
[1] T. Nishitha and P. C. Reddy, “Performance Evaluation of AntHocNet Routing Algorithm in Ad Hoc Networks,”
IEEE International Conference on Computing Sciences, pp. 207-211, 2012.
[2] Z. Futai, et al., “Multi-agent cooperative intrusion response in mobile adhoc networks,” International Journal of
Engineering and Technology (IJET), vol/issue: 4(6), 2013.
[3] P. Braun and W. Rossak, “Mobile Agents,” Elsevier, 2005.
[4] C. Chowdhury and S. Neogy, “Estimating Reliability of Mobile Agent System for Mobile Ad hoc Networks,”
IEEE- Computer Society, 2010.
[5] H. Matsuo and K. Mori, “Accelerated Ants Routing in Dynamic Networks,” in Proc. Intl. Conf. on Software
Engineering, Artificial Intelligence, Networking and Parellel/Distributed Computing, pp. 333-339, 2001.
IJECE ISSN: 2088-8708 
Security Measure to Detect and Avoid Flooding Attacks Using Multi Agent System .... (Bandana Mahapatra)
925
[6] Y. Tokgoz and A. Acampora, “Improving Connectivity and Power Efficiency in Wireless Ad Hoc Networks
Through Agent Nodes,” IEEE, 2005.
[7] K. Fall and K. Vardhanan, “The ns manual,” The VINT Project, UC Berkley, LBL, USC/ISI and XEROX PARC,
2001. http://www.isi.edu/nsnam/ns/nsdocumentation.html
[8] R. R. Choudhury, et al., “A Distributed Mechanism for Topology Discovery in Ad Hoc Wireless Networks Using
Mobile Agents,” IEEE, pp. 145-146, 2000.
[9] B. Kannhovong, et al., “A Survey of Routing Attacks in Mobile AdHoc Networks,” IEEE Wireless
Communications, 2007.
[10] P. Yi, et al., “A New Routing Attack in Mobile Ad Hoc Networks,” International Journal of Information
Technology, vol/issue: 11(2).
[11] M. Patel, et al., “Detection and Prevention of Flooding Attack Using SVM,” International Conference on
Communication Systems and Network Technologies (CSNT), 2013.
[12] D. Milojick, “Mobile Agent Applications,” IEEE concurrency, pp. 80-90, 1999.
BIOGRAPHIES OF AUTHORS
Ms. Bandana Mahapatra is Asst. Professor of Computer Science and Engineering at SOA
University, Bhubaneswar, India since 2008. Her research interest is Security in AdHoc Network
and Artificial Intelligence. Her contribution also includes other issues in Adhoc Network like
efficient power management or searching shortest path for communication using artificial
intelligence. She is currently pursuing her PhD under SOA University, Bhubaneswar.
Dr. Srikanta Patnaik is a Professor of Computer Science and Engineering at SOA University,
Bhubaneswar, India. His research interest is in Machine Intelligence and Robotics, and he has
published more than 100 technical papers in the international journals and magazines of repute.
His name has been placed in the MARQUIS Who‟s Who in the World for the 2004 and he was
also named as the International Educator of the Year 2005, by International Biographical Centre
inGreat Britain. He is the Editor-in-Chief of the International Journal of Information and
Communication Technology, and International Journal of Computation Vision and Robotics, as
well as President and Chief Mentor of Interscience Research Network (IRNet), which is a
professional body to encourage researchers and scholars to enhance their research throughput.

More Related Content

What's hot

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Editor IJARCET
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 

What's hot (17)

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
K1803036872
K1803036872K1803036872
K1803036872
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
IJMNDI.2015.069218
IJMNDI.2015.069218IJMNDI.2015.069218
IJMNDI.2015.069218
 

Similar to Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS

V3 i301
V3 i301V3 i301
V3 i301IJCERT
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetijctet
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETIJMTST Journal
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 

Similar to Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS (20)

V3 i301
V3 i301V3 i301
V3 i301
 
Science journal
Science journalScience journal
Science journal
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manet
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
Ijciet 08 02_002
Ijciet 08 02_002Ijciet 08 02_002
Ijciet 08 02_002
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 2, April 2017, pp. 919~925 ISSN: 2088-8708, DOI: 10.11591/ijece.v7i2.pp919-925  919 Journal homepage: http://iaesjournal.com/online/index.php/IJECE Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS Bandana Mahapatra, Srikanta Patnaik Departement of Computer Science Engineering, Siksha O Anusandhan University, India Article Info ABSTRACT Article history: Received Dec 9, 2016 Revised Mar 14, 2017 Accepted Mar 30, 2017 Security is considered as one of the major challenge when it comes to infrastructure less and self dependent network without any centralized control. The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc. Such attacks generates a variety of problems like disturbing the network by flooding messages that results in waste of battery which is a vital resource to maintain the life span of the network. Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge. The paper proposes a novel technique to identify the flooding attack and measure to overcome them using Multi-Agent system Keyword: AdHoc network system External attack in MANET Flooding attacks Optimal agents in multi-agent system Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Bandana Mahapatra, Computer Science & Engineering Dept., Siksha „O‟ Anusandhan University, Bhubaneswar, India. Email: bandana11@gmail.com 1. INTRODUCTION The Adhoc Network is a system of wireless mobile nodes where a group of nodes within close proximity make a network. Such an infrastructure less and self configured network, on account of unavailability of a proper centralized control and limited resources remains vulnerable to attacks [1]. The attack types can be broadly classified into either an external attack or an internal attack. In external attack, attacker target the network medium to disrupt the normal network flow. The typical examples of external attack can be flooding of messages or propagation of fake routing messages that give rise to Denial of Service Attack. The prevention mechanisms available to avoid such attack types in traditional network are membership authentication, firewall which fails to work due to unstable network medium and frequent topology changes [2]. The volatile topology of MANETS demands concern of the researchers to formulate a proper routing scheme to achieve resilient and an effective communication among the nodes. Mobile Agents are independent route search messages that practically goes around the network from one node to another and update the routing table according to the nodes they visit till they reach destination [3], [4]. This technique as a solution could not prove effective when the network scales up moreover single dependent route as a communication medium posed problems like improper load balancing, unreliable route to depend upon as well as lack of alternative routes available. Multi Agent system solved efficiently load balancing problem as well as provided alternative solution but increased the computational overhead on part of the node while generating agents or causing increase in overall network traffic by launching multiple routing messages as Agents [5]. Therefore launching of huge number of Agents to maintain the network traffic tends to result in increase of network traffic as well as reduced lifetime of a node affecting the overall network. Hence this demands the need to quantify optimal number of nodes suitable for a particular network topology for a particular time [6]. Each agents launched incur additional cost on the
  • 2.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 919 – 925 920 node hence death of an agent due to flooding attacks can be considered as a heavy loss on the part of the node. The paper provides a novel technique of quantifying the optimal number of agents to be launched for route search, checking for possibilities of flooding attack in the network, identifying malicious nodes and taking effective measures to block the node while using alternative routes provided by multiple agents to maintain the flexible and robust communication network flow [7], [8]. 2. RELATED PAPERS Romit roy Choudhury, S. Bandyopadhyay and Krishna Paul [9] proposed a distributed Mechanism for Topology discovery in Ad Hoc Wireless Networks Using Mobile Agents where they have defined a concept of information aging on link affinity based on which a predictive algorithm running on each node can predict the current Network topology based on the current Network information stored at that node. Link affinity, associated with a link between two nodes n and m, is a prediction about span of life of that link in a particular context. They have applied this notion to predict topology by each node and thus be cautious before data transfer is initiated. Ryokichi Onishi Samyasu Yamaguchi, Hirao Ki Morino Hitoshio Aida Jadosaito proposed “The Multi Agent System for Dynamic Network Routing”. They proposed that by multiplying each entry in routing table to store much more information from Agents evaluating them to make better use of information succeeded in rating the Network continuously by 40%. They also suggested that Agents themselves are often written in relatively slow interpreted languages and slightly gain weight for containing code. However if the entire system saves more bandwidth resource for control and reacts more quickly these overheads of Agents might be acceptable. Bounpadith Kannhovong, Hidehisa Nakayama, Yoshiaki Nemoto, and Neikato [10] have conducted a survey on the state of the art of security issues in Manet. They have examined routing attacks like link spoofing, colluding miserly attacks and defense mechanisms against such attacks in existing MANET protocols. Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong in their paper [11] have designed a generic defense against the Adhoc Flooding Attack in mobile Adhoc Network. Their designed mechanism aims at recording the rate of route_request message. Once the threshold is exceeded nodes deny any further request packets from the intruder.333. Meenakshi Patel, Sanjay Sharma, Divya Sharan have proposed in their paper [12] the mechanism for detection and prevention of Flooding Attack using SVM. They have schemed a new method based on AODV behavioral metrics for detecting and preventing Flooding Attacks in MANETS. They have used the PDER, Co and PMIR as metrics to predict the Flooding attacks. 3. DETECTING AND AVOIDING FLOODING ATTACK USING MULTIPLE AGENTS The paper aims at providing a technique to detect flooding attacks in the buffer and use alternative routes to maintain a resilient network. ALGORITHM – 1 TO DETECT AND AVOID FLOODING ATTACKS Start Step1. Set Nearest_neighbor =no of hello_msg Step2. Calculate Agents to be launched =nearest_neighbour/2 Counter = Counter + 1 Step3. Launch agents in network Step4. If flooding_attack = = yes Malicious_node = node_id //Check memory route table Step5. For i = 1to N // N is no of rows in route table If Table [i] = Malicous_node as intermediate node Table[i] = Table[i+1]. End Algorithm-1represents the procedure adopted by the proposed model for detection of Flooding Attacks and measures adopted to avoid it which is shown as Figure 1. The Figure 1 shows the proposed model consisting of 3 main modules. Module1 is generating optimal number of agents, module2 is about
  • 3. IJECE ISSN: 2088-8708  Security Measure to Detect and Avoid Flooding Attacks Using Multi Agent System .... (Bandana Mahapatra) 921 detection of flooding attacks in buffer and module 3 deals with measures to avoid flooding attacks and maintaining a resilient network.The node first calculates the optimal number of Agents to be launched in the network considering the current topology or network scenario [5]. Module 2 Module 1 Module 3 Figure 1. Proposed Node Architecture for Detecting and avoiding flooding attacks These agents move around from one node to other node in search of the destination while keeping a track of the node they visit during their search period. These agents return back to the original node once they reach the destination using the same route. These messages are received by the node and are accumulated in the incoming message buffer where the occurrence of flooding attack is checked in the buffer itself so as to prevent wastage of power in reading same message again. The detection of flooding attack is dealt by blocking the node generating malicious messages and discarding all the routes that has the malicious node as an intermediary node to reach destination. The multiple agents here collect different available routes from a source to destination that helps node to maintain the communication network as well as the connectivity that makes it a resilient or a robust network capable of handling flooding attacks. 3.1. Optimal number of Agents The wireless Ad Hoc Network when scaled up it becomes challenging for the normal wireless routing protocols to keep the Network Routing information current. Hence the Agents become necessary once the Network size is huge. But a Single Agent Network also has its short comings like improper load balancing and only a single communication route to reach from source to destination which is also not dependable due to Ad Hoc nature of the Network. This problem can be addressed by using multiple agent in the Network for communication. Multi-Agents launched in the network though helps increasing the number of received nodes and throughput also increases the computational overhead and network bandwidth. Moreover continuous growth in number of agents becomes a bottleneck with no significant improvement brought on the network performance. This demands launch of optimal number of Agents in the network considering the variable constraints like number of received packets, dropped packets, Normalized Routing Overload, computational overhead, etc [7]. Constrained optimization is the process of optimizing an objective function with respect to some variables in the presence of those variables. Minimum of constrained non linear multivariable function is a gradient based method that is designed to work where objective function and the constraint function are both continuous first derivatives. It uses a sequential quadratic programming (SQP) method, where the function solves a quadratic programming sub problem at each iteration. It may be calculated as – Min ƒ(x) such that: Generate optimal number of nodes Incoming message buffer Alternative available routes Check for Flooding Attacks Update routes in memory Identify malicious node & block its incoming message Remove routes with malicious node Network
  • 4.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 919 – 925 922 { ( ) ( ) 3.2. Detection of Flooding attacks in Buffer Flooding is a denial of service attack designed to degrade the performance of the network or node by flooding it with large amount of traffic flood. Attacks occur when a network or service becomes weight down with packets initiated incomplete connection requests that it can no longer process a genuine connection requests. By flooding a server or host with connections that cannot be completed, the flood attack eventually fills the host memory buffer. Once this buffer is full no further connections can be made and result is Denial of Services [7], [8]. The proposed Knowledge Based model consists of a buffer that receives the incoming messages and the signature module that comprises of message signatures that are categorized as Flooding attack and are subsequently blocked. The incoming messages are first received by the buffer and are pattern matched with the signature module to see if the message is sent by a malicious node creating Syn-Flood attack. If the message is a non match then it is rechecked within the buffer for tracing the possibility of Attack. If the message is found to be repeated beyond a certain threshold, the message is updated in the signature module categorizing it as DoS attack pattern. Incoming Messages (Pattern Matching) N Y(update signature block) (Message rechecked for duplication) Figure 2. Proposed Model for detecting Syn-Flood Attacks in Buffer ALGORITHM -2 ALGORITHM TO DETECT FLOODING ATTACKS IN BUFFER Start Set Threshold T Incoming Message→ Buffer If Message == signatures in memory Counter = Counter + 1 Else Set i = 1 While (Buffer ≠ NULL) If Buffer [0] == Buffer[i] Buffer[0] → Signatures in memory Delete Msg[Buffer[0]] Else i= i+1 If counter > Threshold Block the rotes with node_id in the memory Buffer End … Signature of MSG with multiple copies in buffer Counter = Counter +1 If counte r>T Flooding Attack
  • 5. IJECE ISSN: 2088-8708  Security Measure to Detect and Avoid Flooding Attacks Using Multi Agent System .... (Bandana Mahapatra) 923 3.3. Measures to Avoid Flooding Attacks and Maintain a resilient Network This module is capable of both identifying malicious nodes as well as taking preventive measures to avoid such attack maintaining a robust and resilient network. Once the message buffer encounters a repeated message pattern beyond the threshold levels, the node id of the malicious node sending messages is identified and all further messages from the node is blocked. The routes available with the node having the malicious node as an intermediate one is blocked and alternative routes available through multi agents is used for message communication between the source and destination node. 4. EXPERIMENTAL RESULTS In this work we have analyzed the behavior of varying number of Agents across different network topologies. Here the constraints effecting the overall network performance is considered while quantifying the approx-optimal number of Agents. The constraints effecting the network performance considered are computational overhead on nodes, Normalized Routing Overload, and throughput of the Network. The Figure 3 shows the impact of change in number of Agents launched in the network on different constraints involved in determining the overall network performance hence also determining the aprox optimal number of agents to be launched in the network by a node where the variable 1 is the throughput, 2 is normalised routing overload and 3 is the computational overhead incured upon nodes. Using Trust Regeon Reflective Algorithm and F-Mincon-Constrained non-lenear minimization the perito Optimal Solution for Aprox optimal number of Agents that gives maximum benefit to the network is obtained, shown in Figure 4. Figure 3. Impact on Constraints due to change in number of Agents Launched Figure 4 . Perito Optimal Solution obtained from Trust Region Algorithm Figure 5. Knowledge Based method Vs AODV protocol Figure 6. Alarms Generated in the Knowledge based model of Flood Detection We simulated the proposed algorithm in NS-2 environment using AODV protocol. The results obtained as projected in the Figure 5 shows a significant improvement in detection of Flooding Attacks 1 2 Flood Detection Techniques 0 10 20 30 40 50 60 70 80 90 Atta c k D et e ct e d % a g e 1- Knowledge base - 2- AODV
  • 6.  ISSN: 2088-8708 IJECE Vol. 7, No. 2, April 2017 : 919 – 925 924 generated in the network in comparison to AODV protocol. Figure 6 shows the increase in true positive along with reduction of false positive generated in the network [4]. The true positive leads next to the knowledge base updating thus enabling the signature updation dynamically which is advantageous to the MANETs, that are themselves dynamic in nature and are equipped with limited resources to rely upon, hence demands continuous signature to be updated. 4.1. Result Analysis The proposed knowledgebase DoS detection model simulated gives a rise in throughput by 37.33% and increases the packet delivery ratio as shown in the Figure 5 as well as reduces the end to end delay giving a significant improvement over the network performance. Figure 7 and 8 shows the Normal Routing overload and Overall Packets Dropped in an attack scenario. The results shows a significant improvement in maintaining a resilient network suffering from very low packet drop due to Syn-Flood attack condition in a network having multiple nodes supporting multiple number of Agents. Figure 7. Normalized Routing Overload for the Scaled Network Figure 8. Overall Packets dropped in an attack condition 5. CONCLUSION In the present study we have discussed regarding the Syn-Flood Attack and how dropping or a failure of agents due to heavy network traffic is a heavy loss incurred upon the nodes as well as the network medium as a whole. Thereafter we have proposed a model that would detect the syn-flood attack in the buffer itself saving the energy wastage in processing of such messages as well as generating optimal number of agents so as to keep the network medium traffic low. The model also maintains a robust communication medium while identifying and blocking routes through the malicious node. Further a study on the behavior of the agents launched into the network has been conducted which provides us with a parito optimal number giving us the most beneficial number of agents to be launched. The proposed algorithm of the model has been tested across NS2 medium that gave us the reduced number of drop of packets by 74% and improved NRL of the network. the proposed algorithm, has shown an increase in number of Syn-Flood attack detection by 37% along with increase in rate of true positive alarms generated in the node. REFERENCES [1] T. Nishitha and P. C. Reddy, “Performance Evaluation of AntHocNet Routing Algorithm in Ad Hoc Networks,” IEEE International Conference on Computing Sciences, pp. 207-211, 2012. [2] Z. Futai, et al., “Multi-agent cooperative intrusion response in mobile adhoc networks,” International Journal of Engineering and Technology (IJET), vol/issue: 4(6), 2013. [3] P. Braun and W. Rossak, “Mobile Agents,” Elsevier, 2005. [4] C. Chowdhury and S. Neogy, “Estimating Reliability of Mobile Agent System for Mobile Ad hoc Networks,” IEEE- Computer Society, 2010. [5] H. Matsuo and K. Mori, “Accelerated Ants Routing in Dynamic Networks,” in Proc. Intl. Conf. on Software Engineering, Artificial Intelligence, Networking and Parellel/Distributed Computing, pp. 333-339, 2001.
  • 7. IJECE ISSN: 2088-8708  Security Measure to Detect and Avoid Flooding Attacks Using Multi Agent System .... (Bandana Mahapatra) 925 [6] Y. Tokgoz and A. Acampora, “Improving Connectivity and Power Efficiency in Wireless Ad Hoc Networks Through Agent Nodes,” IEEE, 2005. [7] K. Fall and K. Vardhanan, “The ns manual,” The VINT Project, UC Berkley, LBL, USC/ISI and XEROX PARC, 2001. http://www.isi.edu/nsnam/ns/nsdocumentation.html [8] R. R. Choudhury, et al., “A Distributed Mechanism for Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents,” IEEE, pp. 145-146, 2000. [9] B. Kannhovong, et al., “A Survey of Routing Attacks in Mobile AdHoc Networks,” IEEE Wireless Communications, 2007. [10] P. Yi, et al., “A New Routing Attack in Mobile Ad Hoc Networks,” International Journal of Information Technology, vol/issue: 11(2). [11] M. Patel, et al., “Detection and Prevention of Flooding Attack Using SVM,” International Conference on Communication Systems and Network Technologies (CSNT), 2013. [12] D. Milojick, “Mobile Agent Applications,” IEEE concurrency, pp. 80-90, 1999. BIOGRAPHIES OF AUTHORS Ms. Bandana Mahapatra is Asst. Professor of Computer Science and Engineering at SOA University, Bhubaneswar, India since 2008. Her research interest is Security in AdHoc Network and Artificial Intelligence. Her contribution also includes other issues in Adhoc Network like efficient power management or searching shortest path for communication using artificial intelligence. She is currently pursuing her PhD under SOA University, Bhubaneswar. Dr. Srikanta Patnaik is a Professor of Computer Science and Engineering at SOA University, Bhubaneswar, India. His research interest is in Machine Intelligence and Robotics, and he has published more than 100 technical papers in the international journals and magazines of repute. His name has been placed in the MARQUIS Who‟s Who in the World for the 2004 and he was also named as the International Educator of the Year 2005, by International Biographical Centre inGreat Britain. He is the Editor-in-Chief of the International Journal of Information and Communication Technology, and International Journal of Computation Vision and Robotics, as well as President and Chief Mentor of Interscience Research Network (IRNet), which is a professional body to encourage researchers and scholars to enhance their research throughput.