Detection & Prevention of DDoS and Flooding Attacks in Ad hoc Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Detection & Prevention of DDoS and Flooding Attacks in Ad hoc Network

P. D. Kadam, R.M.Khaire

Many organizations are using LAN (local area network) to access the internet, this enable the work in many industries easy and comfortable. Flooding and D-DOS are the two major threats to WLAN because these two effects causes huge amount of interchange. The two threats are very difficult to detect and resolve because it involves huge network traffic, In this paper we are introducing a broadcast technique to overcome and prevent flooding attack. We are using two techniques to overcome these problems. This work involves two techniques (AVERAGE DISTANCE ESTIMATION) and (RATE LIMITING).AVERAGE ESTIMATION involves estimation of distance and RATE LIMITING involves different controlling units to encounter (DISTRIBUTED DENIEL OF SERVICES) attack. Regular distance estimation technique study and examine the distance values for noticing the hidden solution for controlling D-DOS. The mean values of distance are forecast to define normality in (AVERAGE ESTIMATION). The mean absolute deviation method is used which includes (MAD) technique to distinguish normality from the abnormality.

Keywords: WLAN, Flooding attack, D-DoS attack

Edition: Volume 3 Issue 11, November 2014

Pages: 2878 - 2880

Share this Article

How to Cite this Article?

P. D. Kadam, R.M.Khaire, "Detection & Prevention of DDoS and Flooding Attacks in Ad hoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14143, Volume 3 Issue 11, November 2014, 2878 - 2880

38 PDF Views | 45 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'WLAN'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1952 - 1955

Ultra Wideband on High Speed Wireless Personal Area Networks

A. S. Syed Navaz, G. M. Kadhar Nawaz

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2438 - 2441

STOC: Energy Cost Models of Smartphones for Task Offloading to the Cloud

Rahitha K, Gireesh T K

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 679 - 682

Optimized Energy Conservation in WLAN Using Dynamic Sleep Scheduling

Ajesh. P. A, R. Gowthamani

Share this Article

Similar Articles with Keyword 'Flooding attack'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 433 - 436

Study of Detection and Prevention Techniques for Flooding attack on AODV in MANET

Shruti Bhalodiya, Krunal Vaghela

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 234 - 237

A Defence Strategy against Flooding Attack Using Puzzles by Game Theory

Ch. V. N. Madhuri, R. V. Krishnaiah

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2878 - 2880

Detection & Prevention of DDoS and Flooding Attacks in Ad hoc Network

P. D. Kadam, R.M.Khaire

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 149 - 153

Evading Flooding Attack in MANET Using Node Authentication

Anup A. Wanjari, Vidya Dhamdhere

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1623 - 1626

Detecting DOS Attacks in Software Defined Networking and Cloud Computing

Roniya Ssan Jacob, Dr. Kalimuthu.M

Share this Article
Top