Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Anomaly Detection for Denial of Service Attacks and Malicious Flooding in MANETs


Affiliations
1 PSG College of Technology, Coimbatore, Tamilnadu 641004, India
     

   Subscribe/Renew Journal


MANETs (Mobile Ad hoc Networks) is the self configuring network formed by mobile nodes which are connected by wireless links. Due to the mobility and independent topology, there occur many routing attacks which corrupt the topology of the network. Among several attacks, the Denial of Service (DoS) attacks and Resource Consumption attacks are the harmful attacks in the MANETs since these attacks interrupt the network resource unavailable to its user and resource consumption attack wastes the resources of a specific node. Example for DoS attacks are Black hole and worm hole attack. In Black hole attack, the malicious node sends a forged Route Reply (RREP) packet to a source node that initiates the route discovery in order to pretend to be a destination node and the Wormhole attack is otherwise known as Tunneling attack. The attacker forwards packets through a high quality out of bond link and reply these packets at another location in the network. In this paper, a new method is proposed to detect the anomalies by using the threshold values. Based on these values, the normal nodes could be detected and differentiated from the anomaly nodes. The packets are then made to send through the normal nodes excluding the anomaly nodes. The simulation results show the effectiveness of the proposed method which detects the DoS attacks and malicious flooding attack.


Keywords

Anomaly Detection Scheme, AODV, DoS Attack, Malicious Flooding, MANETs.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 155

PDF Views: 1




  • Anomaly Detection for Denial of Service Attacks and Malicious Flooding in MANETs

Abstract Views: 155  |  PDF Views: 1

Authors

A. D. Jeishri
PSG College of Technology, Coimbatore, Tamilnadu 641004, India
M. Rajesh Babu
PSG College of Technology, Coimbatore, Tamilnadu 641004, India

Abstract


MANETs (Mobile Ad hoc Networks) is the self configuring network formed by mobile nodes which are connected by wireless links. Due to the mobility and independent topology, there occur many routing attacks which corrupt the topology of the network. Among several attacks, the Denial of Service (DoS) attacks and Resource Consumption attacks are the harmful attacks in the MANETs since these attacks interrupt the network resource unavailable to its user and resource consumption attack wastes the resources of a specific node. Example for DoS attacks are Black hole and worm hole attack. In Black hole attack, the malicious node sends a forged Route Reply (RREP) packet to a source node that initiates the route discovery in order to pretend to be a destination node and the Wormhole attack is otherwise known as Tunneling attack. The attacker forwards packets through a high quality out of bond link and reply these packets at another location in the network. In this paper, a new method is proposed to detect the anomalies by using the threshold values. Based on these values, the normal nodes could be detected and differentiated from the anomaly nodes. The packets are then made to send through the normal nodes excluding the anomaly nodes. The simulation results show the effectiveness of the proposed method which detects the DoS attacks and malicious flooding attack.


Keywords


Anomaly Detection Scheme, AODV, DoS Attack, Malicious Flooding, MANETs.