SlideShare a Scribd company logo
1 of 26
DEFENSE MECHANISM AGAINST
    FLOODING ATTACKS ON MANET



                        Presented by

                  M. MuthuMeenakshi
                       Reg.No: 11CS11
                  Guide : Dr. P. Subathra

1                             September 14, 2012
 
             BROAD AREA
    • Networks
         Network is a collection of hardware
     components and computers interconnected by
     communication channels that allow sharing of
     resources and information.
    • Network Security
            Network security consists of provisions and
     policies adopted by the network administrator to
     prevent and monitor unauthorized access, misuse,
     modification and network accessible resources.
2                                           September 14, 2012
 
             SPECIFIC AREA
    MANET
         The MANET(Mobile Adhoc Networks) is a self-
     configuring infrastructureless networks of mobile
     devices connected by wireless links.
    Flooding Attack
         The flooding attack is an attack that attempts to
     cause a failure in a computer system or other data
     processing entity by providing more input than entry
     can process properly.

3                                             September 14, 2012
TAXONOMY




4              September 14, 2012
LITERATURE SURVEY




5                  September 14, 2012
 
    NOVEL DEFENSE MECHANISM AGAINST DATAFLOODING
       ATTACKS IN WIRELESS AD-HOC NETWORKS(2010)
 Methodology
 The Period Based Defense Mechanism (PDM) is used here,
 & is used to enhancing the throughput of burst traffic.
  Advantage
 It can guarantee the Quality of Service (QoS) of burst
 traffic.
 Drawback
 When the number of packets per second is high (burst
 traffic), AODV cannot process packets because of the
 resource exhaustion.
6                                                September 14, 2012
  FLOODING ATTACKS PREVENTION IN MANET(2011)
  Methodology
  Flooding Attack Prevention (FAP) has been developed,
     where FAP refers a defense system against the Ad Hoc
  Flooding Attack.
  It analyse the behaviour of intruder and check it by trust
  function.
   Advantage
  In FAP, the neighbors are categorized into friends (most
  trusted), acquaintances (trusted) and strangers(not trusted).
  Therefore it is easily identified.
  Drawback
  The Problem is it doesn’t work properly with HIGHER
7                                                   September 14, 2012
  NODE MOBILITY.
 
 PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKS
         UNDER FLOODING ATTACKS (2011)
     Methodology
  The influence of flooding attack on the entire network
     performance is analyzed under the circumstances of
     different parameters including
 i. Number of attack nodes
 ii. Flooding frequency
 iii.Network bandwidth
 iv.Number of normal nodes.
    Advantage
  When the number of flooding packets occurs in NIC’s
     processing power, most of the packets in the queue are
8                                                September 14, 2012
     discarded.
Drawback
     When the frequency of flooding increases, the packet
      delays occurs.
     when network resources have been exhausted, with the
      increasing frequency of flooding attacks, It results in the
      loss of packets with long routes .




9                                                       September 14, 2012
 
  HELLO FLOOD ATTACK AND ITS COUNTERMEASURES IN
          WIRELESS SENSOR NETWORKS (2010)
   Methodology
  The proposed security framework for hello flood detection
   via
       A signal strength method
       A client puzzle method
   Advantage
  The Accuracy will be considerly improved, leading to
   better understanding and forecasting such phenomena.
   Drawback
  In these methods, When the node doesn’t receive any
   reply message in a predefined time, it treats sender as a
10 attacker.                                         September 14, 2012
A 
      TRUST BASED SECURITY SCHEME FOR RREQ FLOODING
                 ATTACK IN MANET (2010)
   Methodology
  The Distributive approach has been proposed to detect and
   prevent the RREQ flooding attack.
  The effectiveness of the proposed technique depends on
   the selection of threshold values.
    Advantage
       When the node identifies that sender is originating
   dataflooding, it cutt off the path & send error message.
   Drawback
  It get delays to detect the misbehaving node by allowing
   him to sends more packet until timeout occurs.
11                                               September 14, 2012
    PERFORMANCE ANALYSIS OF FLOODING ATTACK
           PREVENTION ALGORITHM IN MANETS (2009)
  Methodology
  The performance of trust algorithm is used to test the
  adhoc networks to implementing the AODV protocol.
   Advantage
  In this method, the unnecessary traffic is reduced and
  hence the node able to process the data traffic.
  And also send to the destination node in less time.
  Drawback
  This work didn't develop comprehensive models for
  security attacks and a trustworthy security frame-work
  against all possible security attacks in an ad hoc network. .
12                                                 September 14, 2012
 IMPROVING THE PERFORMANCE OF PROBABILISTIC
                   FLOODING IN MANETS (2008)
   Methodology
  This paper has proposed the probabilistic flooding
   algorithm in MANETs.
  The algorithm determines rebroadcast probability by
   considering network density.
    Advantage
  The algorithm provides flexibility.
  It is easy to implement with guaranteed message
   dissemination.
   Drawback
  If the rebroadcast probability p is set to a small value, the
13                                                     September 14, 2012
   reachability will be poor.
 
 PROBABILISTIC BROADCAST FOR FLOODING IN WIRELESS
        MOBILE AD HOC NETWORKS (2002)
   Methodology
  A purely probabilistic approach has been discussed about
   flooding, its attempting to exploit the phase transition
   phenomenon.
    Advantage
  To maintain high reliability, when inorder to reduce the
   number of broadcast packets.
   Drawback
  In the mechanism where a system undergoes a small
   changes of a given parameter in the system induces a great
   shift in the system's global behavior.
  The phenomenon should be extremely cost efficient. 14, 2012
14                                                September
 
     EFFECTIVE FILTERING SCHEME AGAINST RREQ FLOODING
          ATTACK IN MOBILE AD HOC NETWORKS (2007)
  Methodology
  A simple rate based control packet forwarding mechanism
  has been introduced to mitigate malicious control packet.
   Advantage
  The protocol can be made secure against other types of
  possible DOS attacks.
  And none of the genuine nodes in the network are wrongly
  accused as misbehaving node.
  Drawback
  This method does not able to distinguish between genuine
  and forged RREQs from the malicious or victim nodes.
15                                              September 14, 2012
 MISTRAL: EFFICIENT FLOODING IN MOBILE AD-HOC
                    NETWORKS (2006)
   Methodology
       The Mistral compensating mechanism can support
   flooding by a wide range of active applications.
    Advantage
  The Mistral compensating mechanism can be applied to
   other application where the packet loss is an issue.
   Drawback
  It allows only limited simulation modification.
  And the source code can be evaluated with only minor
   modifications.
16                                          September 14, 2012
 
     MITIGATING FLOODING ATTACKS IN MOBILE ADHOC
           NETWORKS SUPPORTING ANONYMOUS
               COMMUNICATIONS (2006)
  Methodology
  Anonymous Secure Routing (ASR) protocol was considered
  It analyze how an attacker can severely degrade the
  performance of the network.
   Advantage
  It can effectively identify and eliminate the nodes that are
  flooding the network.
  Drawback
  In ASR routing protocol, it is not possible to track back the
  source and destination nodes in an anonymous network.
17                                                  September 14, 2012
S.NO   YEAR
                COMPARITIVE STUDY
                  TITLE   AUTHOR                                            EXTRACT
 01    2010   Novel Defense Mechanism       Hyojin Kim,       • PDM mechanism against flooding
              Against Dataflooding          Ramachandra       attacks.
              Attacks in Wireless Adhoc     BhargaChitti,     • Uses Black list by proposed scheme.
              Networks.                     and JooSeo        • Processes packets according to
              IEEE Transactions on          Song, Member,     priority in the black list.
              Consumer Electronics,         IEEE
              Vol.56, No. 2, May2010

 02    2011   Flooding Attacks              Ms. Neetu Singh   • A distributive approach to identified
              Prevention in MANET.          Chouhan, Ms.      and prevent the flooding attack.
              International Journal of      Shweta            • Prevents flooding attack in AODV
              Computer Technology and       Yadav.            Protocol.
              Electronics Engineering
              (IJCTEE) Volume 1,Issue 3

 03    2011   Performance analysis of       Ping Yi , Futai   • Effect of flooding attack on the
              MANETs under flooding         Zou, YanZou ,     performance of them is analyzed.
              attacks. Journal of Systems   and Zhiyang       • Analysis is done under differ
              Engineering & Electronics     Wang              circumstances.
              Vol.22, No. 2, April 2011.
 18                                                                         September 14, 2012
S.NO   YEAR   TITLE                          AUTHOR         EXTRACT
 04    2010   Hello Flood Attack and its     Virendra Pal   • The Signal strength and Client puzzle
              Counterme-asures in WSNs.      Singh,         method uses for attack detection.
               IJCSI International Journal   Sweta Jain     • Nodes have been classified as friend and
              of Computer Science Issues,    and Jyoti      stranger based on the signal strength.
              Vol. 7, Issue 3, No 11, May    Singhai
              2010


 05    2010   A Trust Based Security         Shishir K.   • A novel technique uses to mitigate the
              Scheme for RREQ Flooding       Shandilya    effect of RREQ flooding attack.
              Attack in MANET.               Sunita Sahu. • Using trust estimation function in DSR
              International Journal of                    on demand routing protocol.
              Computer Applns. Vol5                       • Presents a distributive approach in them.
              No.12, Aug2010

 06    2009   Performance Analysis           Revathi        • It addresses trust evaluation in ad hoc
              of Flooding Attack             Venkatara-     networks.
              Prevention Algori-thm in       man, M.        • It based on the extent of friendship
              MANETs. World Academy          Pushpalatha,   between the nodes.
              of Science, Engineering and    and
              Technology. 2009.              T.Rama
                                             Rao
 19
S.NO   YEAR   TITLE                     AUTHOR          EXTRACT
 07    2008   Improving the Perfor-     M. Bani         • Presents a new probabilistic approach
              mance of                  Yassein,        • It dynamically adjusts the rebroadcasting proba-
              Probabilistic Flooding    M.Ould          bility as per the node movement.
              in MANETs.                Khaoua, L.      • It without requiring any assistance of distance
              Second Interna-tional     M.Mackenzi      measurements or exact location determination
              proceedings in Univ       and             devices.
              of Glasgow, G12           S.Papanastas
              8RZ U.K.                  iou
 08    2007   Effective Filtering Sc-   Jian-Hua        • A simple rate based control packet forwarding
              heme against RREQ         Song, Fan       mechanism was introduced.
              Flooding Attack in        Hong , Yu       • Used to mitigate malicious control packet
              MANETs.Internation        Zhang.          floods. A distrusted filtering mechanism is
              al proceedings on                         proposed to mitigate the loss of throughput.
              net-works in
              Huazhong
              Univ. of Science &
              Technology 2007.

 09    2006   MISTRAL: Efficient         Stefan Plis-   • An novel approach to flooding compensating for
              Flooding in Mobile        ch, Mahesh      flooding packets that are not rebroadcast.
              Adhoc Networks.           Balakrishnan    • Mistrals compensation mechanism applies to
              ACM proceedings           , KenBirmn,     applications where packet loss is an issue.
 20           MobiHoc 06,May            Robbert
              Florence, 2006            van Renesse
S.NO   YEAR   TITLE                   AUTHOR         EXTRACT

 10    2006   Mitigating Flooding     Venkat         • The flooding and packet drop attacks was
              Attacks in Mobile       Balakrishnan   analyzed that support anonymous
              Adhoc Networks          ,Vijay Vara-   communication.
              Sup-porting             dharajan, &    • The technique has to identify the benign
              Anonymous               UdayTupak      behaviour of expelled node.
              Communications.         ula,
              2006,Proceedings on     Elisabeth
              Network Macquarie       Gaup Moe
              University, Australia



 11    2002   Probabilistic Broad-    Jian-Hua       • The proposed mechanism prevents this specific
              cast for Flooding in    Song, Fan      kind of DoS attack.
              Wireless Mobile Ad      Hong , Yu      • It does not use any additional network
              hoc Networks.           Zhang.         bandwidth.
              Technical Report                       •A purely probabilistic approach attempting to
              IC/2002 Swiss                          exploit the phase transition phenomenon.
              Federal institute of
              Technology (EPFL)
              Lausanne,Switzerland

 21
BASE PAPER
     NOVEL DEFENSE MECHANISM AGAINST DATAFLOODING ATTACKS IN
     WIRELESS AD-HOC NETWORKS
          AUTHOR : HYOJIN KIM, RAMACHANDRA BHARGAV CHITTI, AND JOOSEOK SONG,
     MEMBER, IEEE
          IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, VOL. 56, NO. 2, MAY 2010


  The identified problem is, When the number of packets per
   second is high (burst traffic), AODV cannot process packets
   because of the resource exhaustion.
  The proposed scheme of Period Based Defense
   Mechanism(PDM) enhances the throughput of burst traffic
   under the data flooding attack.
                            PROPOSED WORK
  The work is looking forward to use Modified Adhoc
22   Ondemand Distance Vector (MAODV) protocol.
                                             September 14, 2012
CONCLUSION
      In the first phase, by the discussion of about some
      flooding attacks and their prevention measures in
      MANETs, its going to implement a Period based defense
      mechanism, it is also seen that MAODV would give
      better results than AODV.
      And in the second phase, the work will aim at
      simulating the throughput of the PDM scheme according
      to the number of attackers and the number of
      transferred packets per second by using NS-2
      simulations.

23                                             September 14, 2012
REFERENCES
      A. Jamalipour, "Self-organizing networks [message from the
       editor-in-chief]," IEEE Wireless Communications , vol. 15, no. 6,
       pp.2-3, Dec. 2008.
      S.-J. Lee and M. Gerla, "Split multipath routing with maximally
       disjoint paths in ad hoc networks," IEEE International Conference
       on Communications(ICC2001) vol. 10, pp. 3201-3205, Jun.
       2001.
      L. Xia and J. Slay, "Securing wireless adhocnetworks: towards a
       mobile agent security architecture," the 2nd Australian
       Information Security Management Conference 2004 (InfoSec
       2004) Nov. 2004.
      M. Al-Shurman, S.M. Yoo, and S. Park, "Black hole attack in
       mobile ad hoc networks," the 42nd annual Southeast regional
       conference ACM Southeast Regional Conference (ACMSE
24                                                         September 14, 2012
       2004) , pp. 96-97, Apr. 2004.
 Ming-Yang Su, “ Prevention of selective black hole attacks on mobile
   adhoc networks through intrusion detection systems” , Elsevier computer
   communication 34 on 2007.
  Yingbin liang, Member, IEEE, H. Vincent Poor, Fellow, and Lei Ying, “
   Secrecy Throughput of MANETs Under Passive and Active Attacks “,
   IEEE Transactions on Information Theory, Vol. 57, No.10, October
   2011.
  Todd R. Andel, Alec Yasinsac , “ Surveying Security Analysis Techniques
   in MANET Routing Protocols “, the 4th quarter 2007, Volume 9, No.4,
   October 2007.
  Charles E. Perkins and Elizabeth M.Royer, “ Adhoc On-Demand Distance
   Vector Routing” , the Second international conference ACMSE, Jan.
   2000.
  Panagiotics Padadimitratos , Member, IEEE, Zygmunt J.Hass, “ Secure
   Data Communication in Mobile Adhoc Networks” , IEEE Journal on
25 Selected Areas in Communications, Vol.24, No.2, Febryary 2006. 2012
                                                           September 14,
THANK YOU




26               September 14, 2012

More Related Content

What's hot

Fundamentals of microwave communication system and radar systems
Fundamentals of microwave communication system and radar systemsFundamentals of microwave communication system and radar systems
Fundamentals of microwave communication system and radar systemssabesh chaudhary
 
Space wave propagation ppt
Space wave propagation pptSpace wave propagation ppt
Space wave propagation pptdhanesh1994
 
Satellite communication lecture8
Satellite communication lecture8Satellite communication lecture8
Satellite communication lecture8sandip das
 
Lecture5 teletraffic
Lecture5 teletrafficLecture5 teletraffic
Lecture5 teletrafficmazlina1202
 
7. log distance and log normal shadowing
7. log distance and log normal shadowing7. log distance and log normal shadowing
7. log distance and log normal shadowingJAIGANESH SEKAR
 
Passive and active devices
Passive and active devicesPassive and active devices
Passive and active devicessrirenga
 
1. introduction to wireless communication
1. introduction to wireless communication1. introduction to wireless communication
1. introduction to wireless communicationJAIGANESH SEKAR
 
smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas pptsanthu652
 
Mobile Radio Propagation
Mobile Radio PropagationMobile Radio Propagation
Mobile Radio PropagationIzah Asmadi
 
Antennas in Wireless Communication
Antennas in Wireless CommunicationAntennas in Wireless Communication
Antennas in Wireless CommunicationWani Zahoor
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysisCKSunith1
 
Anti drowsy alarm for drivers
Anti drowsy alarm for driversAnti drowsy alarm for drivers
Anti drowsy alarm for driversDuc Nguyen Van
 
Telecommunication switching system
Telecommunication switching systemTelecommunication switching system
Telecommunication switching systemMadhumita Tamhane
 
Signal propagation. path loss models
Signal propagation. path loss modelsSignal propagation. path loss models
Signal propagation. path loss modelsNguyen Minh Thu
 
Cellular Architecture Design Concepts
Cellular Architecture Design ConceptsCellular Architecture Design Concepts
Cellular Architecture Design ConceptsT. L. Singal
 

What's hot (20)

Losses in optical fiber
Losses in optical fiberLosses in optical fiber
Losses in optical fiber
 
waveguide-1
waveguide-1waveguide-1
waveguide-1
 
Earlang ejercicios
Earlang ejerciciosEarlang ejercicios
Earlang ejercicios
 
Fundamentals of microwave communication system and radar systems
Fundamentals of microwave communication system and radar systemsFundamentals of microwave communication system and radar systems
Fundamentals of microwave communication system and radar systems
 
Space wave propagation ppt
Space wave propagation pptSpace wave propagation ppt
Space wave propagation ppt
 
Satellite communication lecture8
Satellite communication lecture8Satellite communication lecture8
Satellite communication lecture8
 
Lecture5 teletraffic
Lecture5 teletrafficLecture5 teletraffic
Lecture5 teletraffic
 
7. log distance and log normal shadowing
7. log distance and log normal shadowing7. log distance and log normal shadowing
7. log distance and log normal shadowing
 
Passive and active devices
Passive and active devicesPassive and active devices
Passive and active devices
 
1. introduction to wireless communication
1. introduction to wireless communication1. introduction to wireless communication
1. introduction to wireless communication
 
smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas ppt
 
Mobile Radio Propagation
Mobile Radio PropagationMobile Radio Propagation
Mobile Radio Propagation
 
Massive mimo
Massive mimoMassive mimo
Massive mimo
 
Antennas in Wireless Communication
Antennas in Wireless CommunicationAntennas in Wireless Communication
Antennas in Wireless Communication
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysis
 
Anti drowsy alarm for drivers
Anti drowsy alarm for driversAnti drowsy alarm for drivers
Anti drowsy alarm for drivers
 
Frequency Reuse
Frequency ReuseFrequency Reuse
Frequency Reuse
 
Telecommunication switching system
Telecommunication switching systemTelecommunication switching system
Telecommunication switching system
 
Signal propagation. path loss models
Signal propagation. path loss modelsSignal propagation. path loss models
Signal propagation. path loss models
 
Cellular Architecture Design Concepts
Cellular Architecture Design ConceptsCellular Architecture Design Concepts
Cellular Architecture Design Concepts
 

Similar to Flooding attack manet

PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET Journal
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...IJCSEA Journal
 
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...IJCSEA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd Iaetsd
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...ijcsa
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Flooding attack manet (20)

PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...IRJET-  	  SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
IRJET- SDN Multi-Controller based Framework to Detect and Mitigate DDoS i...
 
557 562
557 562557 562
557 562
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
A two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiencyA two tier approach for preventing black hole attack and improving efficiency
A two tier approach for preventing black hole attack and improving efficiency
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
 
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
ANALYZING THE IMPACT OF BLACKHOLE ATTACKS ON AODV AND DSR ROUTING PROTOCOLS’ ...
 
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack in
 
Fv3510271037
Fv3510271037Fv3510271037
Fv3510271037
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...Proposed Agent Based Black hole Node Detection  Algorithm for Ad-Hoc Wireless...
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Flooding attack manet

  • 1. DEFENSE MECHANISM AGAINST FLOODING ATTACKS ON MANET Presented by M. MuthuMeenakshi Reg.No: 11CS11 Guide : Dr. P. Subathra 1 September 14, 2012
  • 2.   BROAD AREA • Networks Network is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information. • Network Security Network security consists of provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification and network accessible resources. 2 September 14, 2012
  • 3.   SPECIFIC AREA MANET The MANET(Mobile Adhoc Networks) is a self- configuring infrastructureless networks of mobile devices connected by wireless links. Flooding Attack The flooding attack is an attack that attempts to cause a failure in a computer system or other data processing entity by providing more input than entry can process properly. 3 September 14, 2012
  • 4. TAXONOMY 4 September 14, 2012
  • 5. LITERATURE SURVEY 5 September 14, 2012
  • 6.   NOVEL DEFENSE MECHANISM AGAINST DATAFLOODING ATTACKS IN WIRELESS AD-HOC NETWORKS(2010) Methodology  The Period Based Defense Mechanism (PDM) is used here, & is used to enhancing the throughput of burst traffic. Advantage  It can guarantee the Quality of Service (QoS) of burst traffic. Drawback  When the number of packets per second is high (burst traffic), AODV cannot process packets because of the resource exhaustion. 6 September 14, 2012
  • 7.   FLOODING ATTACKS PREVENTION IN MANET(2011) Methodology  Flooding Attack Prevention (FAP) has been developed, where FAP refers a defense system against the Ad Hoc Flooding Attack.  It analyse the behaviour of intruder and check it by trust function. Advantage  In FAP, the neighbors are categorized into friends (most trusted), acquaintances (trusted) and strangers(not trusted).  Therefore it is easily identified. Drawback  The Problem is it doesn’t work properly with HIGHER 7 September 14, 2012 NODE MOBILITY.
  • 8.   PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKS UNDER FLOODING ATTACKS (2011) Methodology  The influence of flooding attack on the entire network performance is analyzed under the circumstances of different parameters including i. Number of attack nodes ii. Flooding frequency iii.Network bandwidth iv.Number of normal nodes. Advantage  When the number of flooding packets occurs in NIC’s processing power, most of the packets in the queue are 8 September 14, 2012 discarded.
  • 9. Drawback  When the frequency of flooding increases, the packet delays occurs.  when network resources have been exhausted, with the increasing frequency of flooding attacks, It results in the loss of packets with long routes . 9 September 14, 2012
  • 10.   HELLO FLOOD ATTACK AND ITS COUNTERMEASURES IN WIRELESS SENSOR NETWORKS (2010) Methodology  The proposed security framework for hello flood detection via  A signal strength method  A client puzzle method Advantage  The Accuracy will be considerly improved, leading to better understanding and forecasting such phenomena. Drawback  In these methods, When the node doesn’t receive any reply message in a predefined time, it treats sender as a 10 attacker. September 14, 2012
  • 11. TRUST BASED SECURITY SCHEME FOR RREQ FLOODING ATTACK IN MANET (2010) Methodology  The Distributive approach has been proposed to detect and prevent the RREQ flooding attack.  The effectiveness of the proposed technique depends on the selection of threshold values. Advantage  When the node identifies that sender is originating dataflooding, it cutt off the path & send error message. Drawback  It get delays to detect the misbehaving node by allowing him to sends more packet until timeout occurs. 11 September 14, 2012
  • 12.   PERFORMANCE ANALYSIS OF FLOODING ATTACK PREVENTION ALGORITHM IN MANETS (2009) Methodology  The performance of trust algorithm is used to test the adhoc networks to implementing the AODV protocol. Advantage  In this method, the unnecessary traffic is reduced and hence the node able to process the data traffic.  And also send to the destination node in less time. Drawback  This work didn't develop comprehensive models for security attacks and a trustworthy security frame-work against all possible security attacks in an ad hoc network. . 12 September 14, 2012
  • 13.  IMPROVING THE PERFORMANCE OF PROBABILISTIC FLOODING IN MANETS (2008) Methodology  This paper has proposed the probabilistic flooding algorithm in MANETs.  The algorithm determines rebroadcast probability by considering network density. Advantage  The algorithm provides flexibility.  It is easy to implement with guaranteed message dissemination. Drawback  If the rebroadcast probability p is set to a small value, the 13 September 14, 2012 reachability will be poor.
  • 14.   PROBABILISTIC BROADCAST FOR FLOODING IN WIRELESS MOBILE AD HOC NETWORKS (2002) Methodology  A purely probabilistic approach has been discussed about flooding, its attempting to exploit the phase transition phenomenon. Advantage  To maintain high reliability, when inorder to reduce the number of broadcast packets. Drawback  In the mechanism where a system undergoes a small changes of a given parameter in the system induces a great shift in the system's global behavior.  The phenomenon should be extremely cost efficient. 14, 2012 14 September
  • 15.   EFFECTIVE FILTERING SCHEME AGAINST RREQ FLOODING ATTACK IN MOBILE AD HOC NETWORKS (2007) Methodology  A simple rate based control packet forwarding mechanism has been introduced to mitigate malicious control packet. Advantage  The protocol can be made secure against other types of possible DOS attacks.  And none of the genuine nodes in the network are wrongly accused as misbehaving node. Drawback  This method does not able to distinguish between genuine and forged RREQs from the malicious or victim nodes. 15 September 14, 2012
  • 16.  MISTRAL: EFFICIENT FLOODING IN MOBILE AD-HOC NETWORKS (2006) Methodology  The Mistral compensating mechanism can support flooding by a wide range of active applications. Advantage  The Mistral compensating mechanism can be applied to other application where the packet loss is an issue. Drawback  It allows only limited simulation modification.  And the source code can be evaluated with only minor modifications. 16 September 14, 2012
  • 17.   MITIGATING FLOODING ATTACKS IN MOBILE ADHOC NETWORKS SUPPORTING ANONYMOUS COMMUNICATIONS (2006) Methodology  Anonymous Secure Routing (ASR) protocol was considered  It analyze how an attacker can severely degrade the performance of the network. Advantage  It can effectively identify and eliminate the nodes that are flooding the network. Drawback  In ASR routing protocol, it is not possible to track back the source and destination nodes in an anonymous network. 17 September 14, 2012
  • 18. S.NO YEAR COMPARITIVE STUDY TITLE AUTHOR EXTRACT 01 2010 Novel Defense Mechanism Hyojin Kim, • PDM mechanism against flooding Against Dataflooding Ramachandra attacks. Attacks in Wireless Adhoc BhargaChitti, • Uses Black list by proposed scheme. Networks. and JooSeo • Processes packets according to IEEE Transactions on Song, Member, priority in the black list. Consumer Electronics, IEEE Vol.56, No. 2, May2010 02 2011 Flooding Attacks Ms. Neetu Singh • A distributive approach to identified Prevention in MANET. Chouhan, Ms. and prevent the flooding attack. International Journal of Shweta • Prevents flooding attack in AODV Computer Technology and Yadav. Protocol. Electronics Engineering (IJCTEE) Volume 1,Issue 3 03 2011 Performance analysis of Ping Yi , Futai • Effect of flooding attack on the MANETs under flooding Zou, YanZou , performance of them is analyzed. attacks. Journal of Systems and Zhiyang • Analysis is done under differ Engineering & Electronics Wang circumstances. Vol.22, No. 2, April 2011. 18 September 14, 2012
  • 19. S.NO YEAR TITLE AUTHOR EXTRACT 04 2010 Hello Flood Attack and its Virendra Pal • The Signal strength and Client puzzle Counterme-asures in WSNs. Singh, method uses for attack detection. IJCSI International Journal Sweta Jain • Nodes have been classified as friend and of Computer Science Issues, and Jyoti stranger based on the signal strength. Vol. 7, Issue 3, No 11, May Singhai 2010 05 2010 A Trust Based Security Shishir K. • A novel technique uses to mitigate the Scheme for RREQ Flooding Shandilya effect of RREQ flooding attack. Attack in MANET. Sunita Sahu. • Using trust estimation function in DSR International Journal of on demand routing protocol. Computer Applns. Vol5 • Presents a distributive approach in them. No.12, Aug2010 06 2009 Performance Analysis Revathi • It addresses trust evaluation in ad hoc of Flooding Attack Venkatara- networks. Prevention Algori-thm in man, M. • It based on the extent of friendship MANETs. World Academy Pushpalatha, between the nodes. of Science, Engineering and and Technology. 2009. T.Rama Rao 19
  • 20. S.NO YEAR TITLE AUTHOR EXTRACT 07 2008 Improving the Perfor- M. Bani • Presents a new probabilistic approach mance of Yassein, • It dynamically adjusts the rebroadcasting proba- Probabilistic Flooding M.Ould bility as per the node movement. in MANETs. Khaoua, L. • It without requiring any assistance of distance Second Interna-tional M.Mackenzi measurements or exact location determination proceedings in Univ and devices. of Glasgow, G12 S.Papanastas 8RZ U.K. iou 08 2007 Effective Filtering Sc- Jian-Hua • A simple rate based control packet forwarding heme against RREQ Song, Fan mechanism was introduced. Flooding Attack in Hong , Yu • Used to mitigate malicious control packet MANETs.Internation Zhang. floods. A distrusted filtering mechanism is al proceedings on proposed to mitigate the loss of throughput. net-works in Huazhong Univ. of Science & Technology 2007. 09 2006 MISTRAL: Efficient Stefan Plis- • An novel approach to flooding compensating for Flooding in Mobile ch, Mahesh flooding packets that are not rebroadcast. Adhoc Networks. Balakrishnan • Mistrals compensation mechanism applies to ACM proceedings , KenBirmn, applications where packet loss is an issue. 20 MobiHoc 06,May Robbert Florence, 2006 van Renesse
  • 21. S.NO YEAR TITLE AUTHOR EXTRACT 10 2006 Mitigating Flooding Venkat • The flooding and packet drop attacks was Attacks in Mobile Balakrishnan analyzed that support anonymous Adhoc Networks ,Vijay Vara- communication. Sup-porting dharajan, & • The technique has to identify the benign Anonymous UdayTupak behaviour of expelled node. Communications. ula, 2006,Proceedings on Elisabeth Network Macquarie Gaup Moe University, Australia 11 2002 Probabilistic Broad- Jian-Hua • The proposed mechanism prevents this specific cast for Flooding in Song, Fan kind of DoS attack. Wireless Mobile Ad Hong , Yu • It does not use any additional network hoc Networks. Zhang. bandwidth. Technical Report •A purely probabilistic approach attempting to IC/2002 Swiss exploit the phase transition phenomenon. Federal institute of Technology (EPFL) Lausanne,Switzerland 21
  • 22. BASE PAPER NOVEL DEFENSE MECHANISM AGAINST DATAFLOODING ATTACKS IN WIRELESS AD-HOC NETWORKS AUTHOR : HYOJIN KIM, RAMACHANDRA BHARGAV CHITTI, AND JOOSEOK SONG, MEMBER, IEEE IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, VOL. 56, NO. 2, MAY 2010  The identified problem is, When the number of packets per second is high (burst traffic), AODV cannot process packets because of the resource exhaustion.  The proposed scheme of Period Based Defense Mechanism(PDM) enhances the throughput of burst traffic under the data flooding attack. PROPOSED WORK  The work is looking forward to use Modified Adhoc 22 Ondemand Distance Vector (MAODV) protocol. September 14, 2012
  • 23. CONCLUSION  In the first phase, by the discussion of about some flooding attacks and their prevention measures in MANETs, its going to implement a Period based defense mechanism, it is also seen that MAODV would give better results than AODV.  And in the second phase, the work will aim at simulating the throughput of the PDM scheme according to the number of attackers and the number of transferred packets per second by using NS-2 simulations. 23 September 14, 2012
  • 24. REFERENCES  A. Jamalipour, "Self-organizing networks [message from the editor-in-chief]," IEEE Wireless Communications , vol. 15, no. 6, pp.2-3, Dec. 2008.  S.-J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks," IEEE International Conference on Communications(ICC2001) vol. 10, pp. 3201-3205, Jun. 2001.  L. Xia and J. Slay, "Securing wireless adhocnetworks: towards a mobile agent security architecture," the 2nd Australian Information Security Management Conference 2004 (InfoSec 2004) Nov. 2004.  M. Al-Shurman, S.M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," the 42nd annual Southeast regional conference ACM Southeast Regional Conference (ACMSE 24 September 14, 2012 2004) , pp. 96-97, Apr. 2004.
  • 25.  Ming-Yang Su, “ Prevention of selective black hole attacks on mobile adhoc networks through intrusion detection systems” , Elsevier computer communication 34 on 2007.  Yingbin liang, Member, IEEE, H. Vincent Poor, Fellow, and Lei Ying, “ Secrecy Throughput of MANETs Under Passive and Active Attacks “, IEEE Transactions on Information Theory, Vol. 57, No.10, October 2011.  Todd R. Andel, Alec Yasinsac , “ Surveying Security Analysis Techniques in MANET Routing Protocols “, the 4th quarter 2007, Volume 9, No.4, October 2007.  Charles E. Perkins and Elizabeth M.Royer, “ Adhoc On-Demand Distance Vector Routing” , the Second international conference ACMSE, Jan. 2000.  Panagiotics Padadimitratos , Member, IEEE, Zygmunt J.Hass, “ Secure Data Communication in Mobile Adhoc Networks” , IEEE Journal on 25 Selected Areas in Communications, Vol.24, No.2, Febryary 2006. 2012 September 14,
  • 26. THANK YOU 26 September 14, 2012