HYBRID TRACE BACK TECHNIQUE FOR PREVENTING DDOS ATTACK ON WIRELESS SENSER NETWORKS

Rajneesh Pachouri, Manoj Pathak, Anurag Jain

Abstract


Wireless sensor network (WSN) is combinations of large number of nodes which are of limited capabilities, to collect sensitive information’s.  Security is main problem in such type of wireless sensor networks. There are a few system assaults conceivable on WSN and distributed denial of service (DDos) assault is one of them. They focus on a wide assortment of essential assets, from banks to news sites, and present a noteworthy test to ensuring individuals can distribute and get to imperative data. There are lots of methodologies implemented to detect and prevent the DDos attack on wireless sensor network but they all suffer from some weakness. To overcome these weaknesses we have proposed a hybrid traceback method (combination of ip logging and packet marking method) for prevention of DDos attack on wireless sensor network.

 


Keywords


WSN, DDoS, packet marking, ip logging

Full Text:

PDF

References


Kumar Singh 1, M P Singh 2, and D K Singh, "ASurvey on Network Security and Attack Defense Mechanism for Wireless Sensor Networks", International Journal of Computer Trends and Technology- May to June Issue 2011.

Horng, Shi-Jinn, et al. "A novel intrusion detection system based on hierarchical clustering and support vector machines." Expert systems with Applications 38.1 (2011): 306-313.

Hayoung Oh,” Attack Classification based on Data Mining Technique and its application for Reliable Medical Sensor Communication”, International Journal of Computer Science and Applications, Vol.6, No. 3, pp 20 – 32, 2009.

Mohammad Wazid , “ Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks” ,Center for Security, Theory and Algorithmic Research, pp. 1-17.

Shun-Sheng Wang, Kuo-Qin Yan , Shu-Ching Wang , Chia-Wei Liu ,”An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks”, Elsevier, pp. 15234–15243, 2011.

Mohit Malik, Namarta kapoor, Esh naryan, Aman Preet Singh,” Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic”, International Journal of Advanced Research in Computer Engineering & Technology,Volume 1, Issue 4, , ISSN: 2278 – 1323, June 2012.

Reda M. Elbasiony , Elsayed A. Sallam , Tarek E. Eltobely ,Mahmoud M. Fahmy ,” A hybrid network intrusion detection framework based on random forests and weighted k-means” Ain Shams Engineering Journal”, vol 4, pp.753–762,2013.

Levent Koc , Thomas A. Mazzuchi, Shahram Sarkani,“A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier”, Elsevier,pp.13492–13500, 2012.

Wenying Fenga, Qinglei Zhangc, Gongzhu Hud, Jimmy Xiangji Huange, “Mining network data for intrusion detection through combining SVMs with ant colony networks”, Elsevier , pp. 127-140, 2013

Megha Bandgar, Komal dhurve, Sneha Jadhav,Vicky Kayastha,Prof. T.J Parvat, “ Intrusion Detection System using Hidden Markov Model (HMM)”, IOSR Journal of Computer Engineering (IOSRJCE)

e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 3, pp.66-70, (Mar. - Apr.2013).

Dat Tran, Wanli Ma, and Dharmendra Sharma,”Network Anomaly Detection using Fuzzy Gaussian Mixture Models”, International Journal of Future Generation Communication and Networking, pp.37-

, 2012.

Vahid Golmah, “ An Efficient Hybrid Intrusion Detection System based on C5.0 and SVM”, International Journal of Database Theory and Application Vol.7, No.2 ,pp.59-70, (2014).

Punam Mulak, Nitin R. Talhar, “Novel Intrusion Detection System Using Hybrid Approach”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 11, ISSN: 2277 128X, November 2014.

Venkata Suneetha Takkellapati1 , G.V.S.N.R.V Prasad,” Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine”, International Journal of Engineering Trends and Technology-Volume3Issue4- 2012

Vaishali Kosamkar, Sangita S Chaudhari,”Improved Intrusion Detection System using C4.5Decision Tree and Support Vector Machine”,International Journal of Computer Science and Information Technologies, Vol. 5 (2) , pp. 1463-1467, 2014

Levent Koc , Thomas A. Mazzuchi, Shahram Sarkani,“A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier”, Elsevier,pp.13492–13500, 2012.




DOI: https://doi.org/10.26483/ijarcs.v9i3.6038

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science