Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
Proceedings of the 11th international conference on World Wide Web
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks
IEEE Transactions on Dependable and Secure Computing
DDoS attack detection method using cluster analysis
Expert Systems with Applications: An International Journal
Monitoring security events using integrated correlation-based techniques
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Size-based scheduling: a recipe for DDOS?
Proceedings of the 17th ACM conference on Computer and communications security
Hi-index | 0.00 |
Mobile Ad-hoc Networks (MANET) provides direct peer-to-peer communication between mobile nodes without any infrastructure. During data transfer, it is possible that an attacker may initiate Distributed Denial of Service (DDoS) that may interfere the entire communication. In this paper, we propose a Hybrid Defense Mechanism based on Cluster Analysis. The network traffic is investigated for the existence of DDoS using Cluster Analysis. The traffic thus investigated is subject to XOR marking which marks the non-legitimate traffic. This helps in identification of the node initiating the DDoS attack, thereby isolates the particular node from further communications. The experimentation is done with 2000 DARPA Intrusion Detection Scenario Specific Data Set to evaluate our method. From the experimental results, it is evident that our proposed scheme is effective in identification of DDoS attacks.