Comparative Analysis of Various Techniques of DDoS Attacks for Detection & Prevention and Their Impact in MANET

  • Chapter
  • First Online:
Performance Management of Integrated Systems and its Applications in Software Engineering

Part of the book series: Asset Analytics ((ASAN))

  • 665 Accesses

Abstract

Wireless nodes all connected together logically make a mobile ad hoc network (MANET). Fundamentally, MANET has no infrastructure which means all the connections are formed without the help of or use of one or more administration which is centralized. A mobile ad hoc network (MANET) can be termed as a network which is spontaneous and which can be set up without any fixed infrastructure. The main goal of denial-of-service (DoS) attack is to make the server and other resources too busy so that request for any information or resource is either not served at all or there is an unexpected delay in response time. When a DoS attack is converted into its severe form, then it is known as distributed denial-of-service (DDoS) attack. A DDoS attack uses several machines to launch the attack by making services block for genuine users. A DDoS attack which can be in form of a bandwidth depletion and resource depletion prevents the legitimate users by flooding the victim’s network with unwanted traffic in form of packets. Various techniques have been implemented to secure the channel, but still security is a major issue over the network. The aim of this research work is to present a comparative analysis of various proposed tools and techniques for detection and prevention of DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sharma, N., Raina, B. L, Rani, P., Chaba, Y., & Singh, Y. (2011). Attack prevention methods for DDoS attacks in MANETs. AJCSIT, 18–21.

    Google Scholar 

  2. Garg, E. I., & Sharma, E. M. (2016). DOS attack mitigation in MANET. IJEDR, 4(3), 769–773.

    Google Scholar 

  3. Singh, N., Chaudhary, S., Verma, K. K., & Vatsa, A. K. (2012, September). Explicit query based detection and prevention techniques for DDoS in MANET. IJCA, 53(2), 19–24.

    Google Scholar 

  4. Jain, Aaditya, & Sharma, Divya. (2016). Approaches to reduce the impact of DOS and DDoS attacks in VANET. IIJCS, 4(4), 1–5.

    Google Scholar 

  5. Ahamad, Tariq, & Aljumah, Abdullah. (2017). Preventive mechanism against DDoS attacks in MANET. International Journal of Advanced and Applied Sciences, 4(5), 94–100.

    Article  Google Scholar 

  6. Upadhyaya, R., Bhatta, U. R., & Tripathi, H. (2016). DDoS attack aware DSR routing protocol in WSN. Procedia Computer Science, 78, 68–74. (Elsevier).

    Google Scholar 

  7. Soni, N., & Singh, V. (2016, November). Detection and prevention scheme against jamming attack in MANET. IJCA, 154(11), 37–41.

    Google Scholar 

  8. Lovely .(2015, April). A review of DoS attack and defence scheme in MANET. IJARCSSE, 5(4), 1107–1112.

    Google Scholar 

  9. Anjusree, S., & Praveena, V. (2013, October). A relative study for detection and prevention of DDoS attacks. IJIRCCE, 1(8), 1786–1792.

    Google Scholar 

  10. Garg, A., & Sharma, M. K. (2015, December). Detection and prevention of vampire attack in MANET. IJRITCC, 3(12), 6793–6798.

    Google Scholar 

  11. Chhabra, M., & Gupta, B. B. (2014, March 15). An efficient scheme to prevent DDoS flooding attacks in mobile. Research Journal of Applied Sciences, Engineering and Technology, 7(10), 2033–2039.

    Google Scholar 

  12. Kumar, Mukesh, & Kumar, Naresh. (2013). Detection and prevention of DDoS attack in MANET’s using disable IP broadcast technique. IJAIEM, 2(7), 29–36.

    Google Scholar 

  13. Vishwakarma, D., Rathore, N., & Khandekar, A. (2015, May). Detection and prevention mechanism for TTL field tampering form of DDoS attack in MANET’s. IJCA, 117(15), 5–10.

    Google Scholar 

  14. Timcenko, V. V. (2014). An approach for DDoS attack prevention in mobile ad hoc networks. Elektronika ir Elektrotechnika, 20(6), 150–153.

    Article  Google Scholar 

  15. Justin, N., & Gava, N. R. (2016, April). A survey on intrusion detection system for DDoS attack in MANET. IJARCCE, 5(4), 1160–1163.

    Google Scholar 

  16. Nalayini, C. M., Katiravan, J., & Arvind Prasad, V. (2017). Flooding attack on MANET—A survey. IJTRD, ISSN: 2394–9333, 25–28.

    Google Scholar 

  17. Suganya, S. G., & Prasanna, D. (2017). Detection and prevention of DDoS attack using modern cracking algorithm. IRJAET, 3(2), 2004–2012.

    Google Scholar 

  18. Khare, A. K., Rana, J. L., & Jain, R. C. (2017). Detection of wormhole, blackhole and DDoS attack in MANET using trust estimation under Fuzzy logic methodology. MECS, 7, 29–35.

    Google Scholar 

  19. Jagpal, & Garg, G. (2017, May). A study and analysis of DoS attacks and prevention scheme. IJIRCCE, 5(5), 10379–10382.

    Google Scholar 

  20. Aljumah, A., & Ahanger, T. A. (2017, February). Futuristic method to detect and prevent blackhole attack in wireless sensor networks. IJCSNS, 17(2), 194–201.

    Google Scholar 

  21. Mangat, J., & Kaur, E. J. (2017, April). Review on the flooding attacks in mobile Ad Hoc networks. IJARCSSE, 7(4), 390–392.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, N., Dumka, A., Sharma, R. (2020). Comparative Analysis of Various Techniques of DDoS Attacks for Detection & Prevention and Their Impact in MANET. In: Pant, M., Sharma, T., Basterrech, S., Banerjee, C. (eds) Performance Management of Integrated Systems and its Applications in Software Engineering. Asset Analytics. Springer, Singapore. https://doi.org/10.1007/978-981-13-8253-6_14

Download citation

Publish with us

Policies and ethics

Navigation