One small step for a man
One Giant leap for the mankind

There is no wealth like Knowledge
                            No Poverty like Ignorance
Journal of Emerging Trends in Computing and Information Sciences Logo

Journal of Emerging Trends in Computing and Information Sciences >> Call for Papers Vol. 8 No. 3, March 2017

Journal of Emerging Trends in Computing and Information Sciences

Detection and Control of DDOS Attacks over Reputation and Score Based MANET

Full Text Pdf Pdf
Author Rizwan Khan , A. K. Vatsa
ISSN 2079-8407
On Pages 646-655
Volume No. 2
Issue No. 11
Issue Date November 01, 2011
Publishing Date November 01, 2011
Keywords MANET, DOS, DDOS, Cluster, Attacks, Reputation, Monitor


MANET is quickly spreading for the property of its capability in forming rapidly changing topologies network without the aid of any established infrastructure or centralized administration. The security challenges in MANET have become a primary concern to provide secure communication. The Attacks on MANET disrupts network performance and reliability. The DOS (denial-of-service), Distributed denial-of-service (DDoS) attacks are a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. These attacks lead toward the degradation or prevention of legitimate use of network resources. There is a need to provide an incentive or credit based mechanism that can provide cooperation among nodes in the network and improve overall network performance and functionality by prevention, detection and control of DOS and DDOS attacks. Therefore, in this paper, we proposed the detection and control mechanism for DDOS attacks over reputation and score based MANET and a clustering technique uses the reputation and score value of nodes.


    Journal of Computing | Call for Papers (CFP) | Journal Blog | Journal of Systems and Software | ARPN Journal of Science and Technology | International Journal of Health and Medical Sciences | International Journal of Economics, Finance and Management     
© 2015 Journal of Computing