Plummeting flood based distributed-DoS attack to upsurge networks performance in ad-hoc networks using neighborhood table technique

V Vimal, MJ Nigam - TENCON 2017-2017 IEEE Region 10 …, 2017 - ieeexplore.ieee.org
Mobile entities are unrestricted to form communication grid without any predefined
substructure in MANET. Though it offers great resilience, but extra challenges for MANETs to …

Comparative analysis of various techniques of DDoS attacks for detection & prevention and their impact in MANET

N Singh, A Dumka, R Sharma - … Management of Integrated Systems and its …, 2020 - Springer
Wireless nodes all connected together logically make a mobile ad hoc network (MANET).
Fundamentally, MANET has no infrastructure which means all the connections are formed …

[PDF][PDF] Quality based Bottom-up-Detection and Prevention Techniques for DDOS in MANET

L Bala, AK Vatsa - International Journal of Computer Applications, 2012 - Citeseer
The distributed denial of service attack (DDoS) is a major threat to current internet security in
MANET. Although the DDoS mechanism is widely understood, its detection is a very hard …

An approach for DDoS attack prevention in mobile ad hoc networks

VV Timcenko - Elektronika ir Elektrotechnika, 2014 - eejournal.ktu.lt
In this paper we propose a prevention mechanism for distributed denial of service (DDoS)
attacks in Mobile Ad hoc Networks (MANET) environment. Since MANETs are wireless, self …

Defence Mechanism for Sybil Attacks in MANETS using ABR Protocol

P Sowmya, V Anitha - International Journal of Advanced …, 2014 - search.proquest.com
Security is a paramount concern in any ad-hoc network. In Mobile Adhoc NETworks, mobility
of the nodes poses a problem for providing security services. The ad-hoc network is …

[PDF][PDF] Machine learning framework for audit fraud data prediction

A Tiwari, N Hooda - Res Gate Publ, 2018 - researchgate.net
This research is about visiting an audit company to explore the practicality of machine
learning for an audit data work. Data of 777 different firms are collected from six distinct …

Kurumlar için siber güvenlik laboratuvarı altyapısının oluşturulması

AE Adir - 2019 - acikbilim.yok.gov.tr
Bu çalışma, hassas ve gizli verilerin saklandığı ve işlendiği kritik bilişim sistemlerinin maruz
kaldığı güncel siber tehditlere karşı yüksek seviyede güvenliğin sağlanabilmesi için ilgili …

[图书][B] Mitigate denial of service attacks in mobile ad-hoc networks

A Alsumayt - 2017 - search.proquest.com
Wireless networks are proven to be more acceptable by users compared with wired
networks for many reasons, namely the ease of setup, reduction in running cost, and ease of …

Designing acknowledgement based MANET using public key cryptography

M Kashikar, S Nimbhorkar - 2013 8th International Conference …, 2013 - ieeexplore.ieee.org
Network is an interconnected system of living or non-living things. In broadcasting
communication system, group of broadcasting stations transmits the same programs" the …

Prevention of DOS/DDOS Attacks Through Expert Honey Mesh Security Infrastructure

S Khan, T Ali, U Draz, S Yasin… - Information Security …, 2022 - api.taylorfrancis.com
Network security is considered as the main component in information security because it is
responsible for passing secure information between networks and saving confidential …