Read More.

Call for Paper - January – 2025 Edition   

(SJIF Impact Factor: 5.966) (IJIFACTOR 3.8, RANKING: A+) (PIF: 3.460)

IJATCA solicits original research papers for the January – 2025 Edition.
Last date of manuscript submission is January 30, 2025.

                                                   

VARIOUS DDOS PREVENTION TECHNIQUES: A SURVEY


Volume: 1 Issue: 5
Year of Publication: 2015
Authors: Navjot Singh, Sarabdeep Singh



Abstract

Security and Privacy are two important parameters that need to be considered when dealing with Wireless Sensor Networks as WSN operate in an unattended environment and carry sensitive information critical to the application. However, applying security techniques that consume minimum resources is still a challenge and this paper makes an attempt to address the same. One of the major attacks in sensor network is Denial of Service(DoS) attack that not only diminishes the network capacity but also affects the reliability of information being transmitted. Distributed Denial of Service attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system or network resources. Due to the continuous evolution of new attacks and ever-increasing number of vulnerable hosts on the Internet, many DDoS attack detection or prevention mechanisms have been proposed. In this paper, we present a comprehensive survey of DDoS attacks, detection techniques.

References

  1. L. Osadciw, R.. Muraleedharan,\" Decision Making in a Building access system Using Swarm intelligence and Posets\" 38th Annual Conference on Information Sciences and Systems, Princeton Unversity, 2004.

  2. L. Osadciw, R.. Muraleedharan and,\" Cross Layer Denial of Service Attacks in Wireless Sensor Network Using Swarm Intelligence\" 2006 IEEE.

  3. J. Bruten, O. Holland and R. Schoonderwoerd, \"Ant-like agents for load balancing in telecommunications networks\" Agents

  4. J. Walters, Z. Liang, W. Shi, and V. Chaudhary \" Wireless Sensor Network Security: A Survey\". [17] J. Bruten, O. Holland and R. Schoonderwoerd, \"Ant-like agents for load balancing in telecommunications networks\" Agents

  5. H. Zhu, K. Xu, Y. Liu,,, and Y. Jial, \"A Routing Strategy Based on Ant Algorithm For WSN\", Third International Conference on Natural Computation (ICNC 2007).

  6. D. Culler, D. Estrin, and M. Srivastava. \"Overview of sensor networks.\" IEEE Computer, pages 41-49, Aug. 2004.

  7. D. Raymond and Scott F. Midkiff \"Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses\" 2008 IEEE.

  8. D. Qian, Y. Wen, Y. Chen, and \"An Ant-based approach to Power-Efficient Algorithm for wireless sensor networks\" Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2, 2007, London, U.K.

  9. D. Qian, H. Chen, W. Wu, L. Cheng, \"Swarm Intelligence Based Energy Balance Routing For Wireless Sensor Networks\", 2nd International Symposium on Intelligent Information Technology Application.

  10. C. Li, F. Chiang, H. Chao W. Chen, \"Jumping ant routing algorithm for sensor networks\" 2007 Published by Elsevier B.V.

  11. C. K., and K. V. Viswanatha \"Enhanced Ant Colony Based Algorithm for Routing in Mobile Ad Hoc Network\" World Academy of Science, Engineering and Technology 46 2008.

  12. C. Karlof, D. Wagner \"Secure routing in wireless sensor networks: attacks and countermeasures\" 2003 Elsevier.

  13. B. Abolhassani, M. Ziyadi, K. Yasami, \"Adaptive Clustering for Energy Efficient Wireless Sensor Networks based on Ant Colony Optimization\", 2009 7th Annual Communications Networks and Services Research Conference.

  14. H. Mittal A. Agarwal, I S.K. Dhurandher, S Misra,, I. Woungang, \"Ant Colony Optimization -Based Congestion Control in Ad-hoc Wireless Sensor Networks\", 2009 IEEE.

  15. H. Chan and A. Perrig. \"Security and privacy in sensor networks\". IEEE Computer Magazine, pages 103-105, Oct. 2003.

  16. Avancha, S,

  17. A. Chowdhury \"ACO Routing in Wireless Sensor Networks\", Jan 2008.

  18. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. \"Wireless sensor networks: a survey\". Computer Networks, 38:393-422, 2002.

  19. A. Wood and J. Stankovic. \"Denial of service in sensor networks\". IEEE Computer Vol 35, Issue: 10,Oct 2002.

  20. L. Osadciw, R.. Muraleedharan, \"Jamming Attack Detection and countermeasures In Wireless Sensor Network Using Ant System\"SPIE Defence and Security, Orlando, 2006.

  21. Y. Wang, G. Attebury and B. Ramamurthy \"A Survey of Security issues in Wireless Sensor Nework\", 2nd Quarter 2006, Vol. 8, No. 2 IEEE

Keywords

DDoS, Wireless Sensor Network




© 2025 International Journal of Advanced Trends in Computer Applications
Foundation of Computer Applications (FCA), All right reserved.
Vision & Mission | Privacy Policy | Terms and Conditions