![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Anomaly Detection for Denial of Service Attacks and Malicious Flooding in MANETs
Subscribe/Renew Journal
MANETs (Mobile Ad hoc Networks) is the self configuring network formed by mobile nodes which are connected by wireless links. Due to the mobility and independent topology, there occur many routing attacks which corrupt the topology of the network. Among several attacks, the Denial of Service (DoS) attacks and Resource Consumption attacks are the harmful attacks in the MANETs since these attacks interrupt the network resource unavailable to its user and resource consumption attack wastes the resources of a specific node. Example for DoS attacks are Black hole and worm hole attack. In Black hole attack, the malicious node sends a forged Route Reply (RREP) packet to a source node that initiates the route discovery in order to pretend to be a destination node and the Wormhole attack is otherwise known as Tunneling attack. The attacker forwards packets through a high quality out of bond link and reply these packets at another location in the network. In this paper, a new method is proposed to detect the anomalies by using the threshold values. Based on these values, the normal nodes could be detected and differentiated from the anomaly nodes. The packets are then made to send through the normal nodes excluding the anomaly nodes. The simulation results show the effectiveness of the proposed method which detects the DoS attacks and malicious flooding attack.
Keywords
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 268
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 1