Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 24
Page No. 4979 - 4985

Efficient DDoS Attack Detection Techniques for Privacy Protecting Routing Protocol in MANET

Authors : E. Ahila Devi, K. Chitra and C. Selvakumar

References

Abbas, S., M. Merabti, D. Llewellyn-Jones and K. Kifayat, 2013. Lightweight sybil attack detection in MANETs. IEEE. Syst. J., 7: 236-248.
CrossRef  |  Direct Link  |  

Bindra, G.S., A. Kapoor, A. Narang and A. Agrawal, 2012. Detection and removal of co-operative blackhole and grayhole attacks in MANETs. Proceedings of the 2012 International Conference on System Engineering and Technology (ICSET), September 11-12, 2012, IEEE, Haryana, India, ISBN: 978-1-4673-2375-8, pp: 1-5.

Chen, E.Y. and A. Yonezawa, 2005. Practical techniques for defending against DDoS attacks. Proceedings of the 3rd ACS/IEEE International Conference on Computer Systems and Applications, January 6-6, 2005, IEEE, Tokyo, Japan, ISBN: 0-7803-8735-X, pp: 72-72.

Chonka, A., W. Zhou, J. Singh and Y. Xiang, 2008. Detecting and tracing DDoS attacks by intelligent decision prototype. Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications PerCom 2008, March 17-21, 2008, IEEE, Geelong, Victoria, Australia, ISBN: 978-0-7695-3113-7, pp: 578-583.

Chwalinski, P., R. Belavkin and X. Cheng, 2013. Detection of application layer DDoS Attacks with clustering and bayes factors. Proceedings of the 2013 IEEE International Conference on Systems, Man and Cybernetics, October 13-16, 2013, IEEE, London, UK., ISBN: 978-1-4799-0652-9, pp: 156-161.

Gandikota, V.R., B.R. Tamma and C.S.R. Murthy, 2008. Adaptive FEC-based packet loss resilience scheme for supporting voice communication over ad hoc wireless networks. IEEE. Trans. Mob. Comput., 7: 1184-1199.
CrossRef  |  Direct Link  |  

Khalil, I. and S. Bagchi, 2011. Stealthy attacks in wireless ad hoc networks: Detection and countermeasure. IEEE Trans. Mobile Comput., 10: 1096-1112.
CrossRef  |  Direct Link  |  

Nadeem, A. and M. Howarth, 2013. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommun. Syst., 52: 2047-2058.
CrossRef  |  Direct Link  |  

Shila, D.M., Y. Cheng and T. Anjali, 2010. Mitigating selective forwarding attacks with a channel-aware approach in WMNs. IEEE. Trans. Wirel. Commun., 9: 1661-1675.
CrossRef  |  Direct Link  |  

Shrestha, R., K.H. Han, D.Y. Choi and S.J. Han, 2010. A novel cross layer intrusion detection system in MANET. Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, April 20-23, 2010, Perth, WA., pp: 647-654.

Xing, F. and W. Wang, 2010. On the survivability of wireless ad hoc networks with node misbehaviors and failures. IEEE. Trans. Dependable Secure Comput., 7: 284-299.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved