[PDF][PDF] Denial of service attacks

Q Gu, P Liu - Handbook of Computer Networks: Distributed Networks …, 2007 - s2.ist.psu.edu
Denial of service (DoS) attacks have become a major threat to current computer networks.
To have a better understanding on DoS attacks, this article provides an overview on existing …

Detect DDoS flooding attacks in mobile ad hoc networks

Y Guo, S Perreau - International Journal of Security and …, 2010 - inderscienceonline.com
Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In
this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First …

Network forensics in MANET: traffic analysis of source spoofed DoS attacks

Y Guo, M Simon - … Conference on Network and System Security, 2010 - ieeexplore.ieee.org
The process of analyzing available network forensics evidence to determine their meaning
and significance can be very involved. It is often necessary to develop a timeline of …

Forensic analysis of DoS attack traffic in MANET

Y Guo, I Lee - … Fourth International Conference on Network and …, 2010 - ieeexplore.ieee.org
This paper investigates distributed denial of service attacks using non-address-spoofing
flood (NASF) over mobile ad hoc networks (MANET). Detection features based on statistical …

A new genetic algorithm for the channel routing problem

J Lienig, K Thulasiraman - Proceedings of 7th International …, 1994 - ieeexplore.ieee.org
A new genetic algorithm for channel routing in VLSI circuits is presented. It is based on a
random path search in a lattice-like representation of the routing channel. The performance …

Defence against packet injection in ad hoc networks

Q Gu, P Liu, CH Chu, S Zhu - International Journal of …, 2007 - inderscienceonline.com
Wireless ad hoc networks have very limited network resources and are thus susceptible to
attacks that focus on resource exhaustion, such as the injection of junk packets. These …

Analysis of area-congestion-based DDoS attacks in ad hoc networks

Q Gu, P Liu, CH Chu - Ad Hoc Networks, 2007 - Elsevier
Increased instances of distributed denial of service (DDoS) attacks on the Internet have
raised questions on whether and how ad hoc networks are vulnerable to such attacks. This …

A pheromone-aided multipath QoS routing protocol and its applications in MANETs

P Barom Jeon, G Kesidis - Journal of Communications Software and …, 2006 - hrcak.srce.hr
Sažetak In this paper, we present an ant-based multipath QoS routing protocol that utilizes a
single link metric combining multiple weighted criteria. The metric is applied to the proposed …

[PDF][PDF] A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET

S Ahmed, SM Nirkhi - … Journal of Advanced Computer Science and …, 2013 - Citeseer
Mobile Ad Hoc Network (MANET) is a mobile distributed wireless networks. In MANET each
node are self capable that support routing functionality in an ad hoc scenario, forwarding of …

[PDF][PDF] Attack prevention and attack detection strategies by comparing different DDos models

R Seshadri - International Journal of Computer Applications, 2015 - Citeseer
DDoS attacks are launched with the intention of depleting the network and server resources.
The proposed work identifies that the malice behavior of the nodes requesting service and …