Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2909067.2909069acmotherconferencesArticle/Chapter ViewAbstractPublication PageswirConference Proceedingsconference-collections
research-article

An Approach Used In Wireless Network to Detect Denial of Service Attack

Published: 21 March 2016 Publication History

Abstract

The shared behavior of wireless network makes it more vulnerable to Denial of Service attack. A Denial of Service (DOS) attack is a planned attempt to make resources unable to the legitimate client. These attacks can easily launch by perpetrator emitting no. of signals that do not follow MAC protocol. A DOS attacks are the significant cause of data corruption and malfunctioning of a wireless network. In this paper, we proposed a new approach to detect denial of service attack in wireless, which not only detect attack, but also differentiate it from the natural condition occur in a network. The proposed method uses different network factor and statistical method to calculate threshold value.

References

[1]
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks, In ACM MobiHoc 05, page to appear. ACM Press, 2005.
[2]
Yee Wei, L. Lodewijk, V. Hoesel, J. Doumen, P. Hartel, P.Havinga, Energy-Efficient Link-Layer Jamming Attacks against Wireless ensor Network MAC Protocols, SANS 05, November 7, 2005, Virginia, USA.
[3]
Y. Law, P. Hartel, J. den Hartog, and P. Havinga. Linklayer jamming attacks on S-MAC, In 2nd European Workshop on Wireless Sensor Networks (EWSN 2005), pages 217 225. IEEE, 2005.
[4]
Wood, J. Stankovic, and S. Son., JAM: A jammed-area mapping service for sensor networks, In 24th IEEE Real Time Systems Symposium, pages 286--297, 2003.
[5]
J. G. Proakis. Digital Communications. McGraw-Hill, 4th edition, 2000.
[6]
Schleher. Electronic Warfare in the Information Age. MArtech House, 1999.
[7]
CrossBow Corporation, MICA2 Data Sheet {Online}, http://www.xbow.com.MICA2 data sheet.
[8]
S. Chebrolu, A. Abraham, J.P. Thomas, Feature deduction and ensemble design of intrusion detection systems, Computers & Security, Vol. 24, pp. 295--307, 2005.
[9]
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers & Security, Vol. 28, pp. 18--28, 2008.
[10]
A.D.Wood and J.A.Stankovic, Denial of service in sensor Networks, IEEE Computer, 35(10):54 62, Oct.2002.
[11]
M. Vamsikrishna, R. Sudhakrishna Network Jamming Detection Prevention Using Hidding Method IJCTT 2011.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WIR '16: Proceedings of the ACM Symposium on Women in Research 2016
March 2016
179 pages
ISBN:9781450342780
DOI:10.1145/2909067
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Anomaly Detection
  2. Denial of Service (DOS) attack
  3. Jamming Attack
  4. Security
  5. Wireless Network

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WIR '16
WIR '16: Women in Research 2016
March 21 - 22, 2016
Indore, India

Acceptance Rates

WIR '16 Paper Acceptance Rate 35 of 117 submissions, 30%;
Overall Acceptance Rate 35 of 117 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 73
    Total Downloads
  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media