MM Salim, S Rathore, JH Park - The Journal of Supercomputing, 2020 - Springer
… , we review the various state-of-the-art literature on detecting, … , another attack is launched forcing the victim to denyservice … assign preventionpolicies for effective prevention. To counter …
S Sinha, N Mahadev Prasad - Innovative Data Communication …, 2022 - Springer
… of Sybil attacks in various MANET environments which are … level in terms of time windows analysis, the high intensity of … policyin the first case, causing a much greater variation in the …
FA Alhaidari, AM Alrehan - … Journal of Distributed Sensor …, 2021 - journals.sagepub.com
… review in section “Literature review” with a focus on the studies that involve the usage of datasets in evaluating their DDoS attackdetection … for detecting flooding attacks on MANETs by …
… This survey aims at providing an extensive review of the … Detecting shrew attacks in a MANET (Mobile Ad-hoc Network) … adapted for slowloris attackdetection setting rules accordingly […
S Subramani, M Selvi - International Journal of Information …, 2023 - inderscienceonline.com
… In this paper, the attackdetection and prevention of DDoS … the detection and prevention of attacks haven considered. Moreover, since IDSs are monitoring programs to detect the attacks …
K Salunke, U Ragavendran - Wireless Personal Communications, 2021 - Springer
… the DDoS attacks ie distributeddenial of serviceattack which becomes a nightmare for the researchers. This attack is one of the most devastating attacks … of the sketch strategies. First by …
… DOSattacksuse packet flooding and jamming to disrupt the … We reviewed recent publications to compile a list of existing … DDoS attacks at MAC layer in tactical mobileadhocnetworks. …
R Karthikeyani, E Karthikeyan - Asian Journal of Research in …, 2023 - archive.jibiology.com
… paper reviews various type of DDOS attacks, Symptoms of DDOS attack, role of botnet on DDOS attack and … The bot programs are received and execute commands send by bot master. …
… and interoperability that hamper the use of common networking protocols and policies. DDoS … to demonstrate a comparative analysis of the attackdetection ability of these classifiers. …