Detection of abrupt changes: theory and application
Detection of abrupt changes: theory and application
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Resisting Flooding Attacks in Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Security scheme for malicious node detection in mobile ad hoc networks
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
A framework for misuse detection in ad hoc Networks-part I
IEEE Journal on Selected Areas in Communications
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Error analysis of range-based localisation algorithms in wireless sensor networks
International Journal of Sensor Networks
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
Hi-index | 0.00 |
Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.