Downloads: 122 | Views: 133
M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 4 Issue 7, July 2015
Zombie Attack Analyser and Counter Measure In Cloud
Lokesh A. Kochekar | S. P. Washimkar
Abstract: Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this field has focused primarily on denial of communication at the routing or medium access control levels. Exploring resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. These Zombie attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Zombie attacks are very and difficult to detect and are easy to carry out with the normal data. A single zombie attack increases the data size. We discuss the methods to detect and stop this kind of attack. For this We create a network showing how the data is transfer from source to destination and also monitors whether the given data is normal or the data is infected by zombie attack.
Keywords: network nodes, malicious conditions
Edition: Volume 4 Issue 7, July 2015,
Pages: 1048 - 1051
Similar Articles with Keyword 'network nodes'
Downloads: 102
Case Studies, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1760 - 1767Policy Based an Effective and Efficient Bandwidth Optimisation for Performance Enhancement of an Organisation
Ashok Kumar Tripathi [2] | Ramesh Bharti
Downloads: 107
Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 7, July 2014
Pages: 2187 - 2188Basic Concepts of Wireless Network