A. Muntaheen, Milton Chandro Bhowmick, Md. Raqibul Hasan Rumman, Nayeem Al-Tamzid Bhuiyan, Md. Taslim Mahmud Bhuyain, Md. Rakibul Islam, Md. Babar Ali Bhuyan, Md Sahadat Hossain Sagor, Md. Murshadul Hoque, Md. Majharul Islam, M. Hasan
{"title":"城域网中DoS攻击的智能检测和预防程序","authors":"A. Muntaheen, Milton Chandro Bhowmick, Md. Raqibul Hasan Rumman, Nayeem Al-Tamzid Bhuiyan, Md. Taslim Mahmud Bhuyain, Md. Rakibul Islam, Md. Babar Ali Bhuyan, Md Sahadat Hossain Sagor, Md. Murshadul Hoque, Md. Majharul Islam, M. Hasan","doi":"10.25081/RRST.2021.13.6848","DOIUrl":null,"url":null,"abstract":"A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any preestablished fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.","PeriodicalId":20870,"journal":{"name":"Recent Research in Science and Technology","volume":"3 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Smart detection and prevention procedure for DoS attack in MANET\",\"authors\":\"A. Muntaheen, Milton Chandro Bhowmick, Md. Raqibul Hasan Rumman, Nayeem Al-Tamzid Bhuiyan, Md. Taslim Mahmud Bhuyain, Md. Rakibul Islam, Md. Babar Ali Bhuyan, Md Sahadat Hossain Sagor, Md. Murshadul Hoque, Md. Majharul Islam, M. Hasan\",\"doi\":\"10.25081/RRST.2021.13.6848\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any preestablished fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.\",\"PeriodicalId\":20870,\"journal\":{\"name\":\"Recent Research in Science and Technology\",\"volume\":\"3 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Recent Research in Science and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.25081/RRST.2021.13.6848\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Research in Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25081/RRST.2021.13.6848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Smart detection and prevention procedure for DoS attack in MANET
A self-organized wireless communication short-lived network containing collection of mobile nodes is mobile ad hoc network (MANET). The mobile nodes communicate with each other by wireless radio links without the use of any preestablished fixed communication network infrastructure or centralized administration, such as base stations or access points, and with no human intervention. In addition, this network has potential applications in conference, disaster relief, and battlefield scenario, and have received important attention in current years. There is some security concern that increases fear of attacks on the mobile ad-hoc network. The mobility of the NODE in a MANET poses many security problems and vulnerable to different types of security attacks than conventional wired and wireless networks. The causes of these issues are due to their open medium, dynamic network topology, absence of central administration, distributed cooperation, constrained capability, and lack of clear line of defense. Without proper security, mobile hosts are easily captured, compromised, and attacked by malicious nodes. Malicious nodes behavior may deliberately disrupt the network so that the whole network will be suffering from packet losses. One of the major concerns in mobile ad-hoc networks is a traffic DoS attack in which the traffic is choked by the malicious node which denied network services for the user. Mobile ad-hoc networks must have a safe path for transmission and correspondence which is a serious testing and indispensable issue. So as to provide secure communication and transmission, the scientist worked explicitly on the security issues in versatile impromptu organizations and many secure directing conventions and security measures within the networks were proposed. The goal of the work is to study DoS attacks and how it can be detected in the network. Existing methodologies for finding a malicious node that causes traffic jamming is based on node’s retains value. The proposed approach finds a malicious node using reliability value determined by the broadcast reliability packet (RL Packet). In this approach at the initial level, every node has zero reliability value, specific time slice, and transmission starts with a packet termed as reliability packet, node who responded properly in specific time, increases its reliability value and those nodes who do not respond in a specific time decreases their reliability value and if it goes to less than zero then announced that it’s a malicious node. Reliability approach makes service availability and retransmission time.