SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT
Keywords:Securing Mobile, Network, Cloud Environment
Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats next to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load balancing, throttling and Honey pots) to build hybrid defense method, in meticulous with dissimilar cloud computing layers, is extremely recommended. In this paper, a variety of DDoS attacks have been presented. We as well highlighted the defense methods to counter attack dissimilar types DDoS attacks in the cloud environment. This paper proposes SVM-based algorithm to anomaly intrusion detection. A multiclass SVM algorithm with parameter optimized by PSO (MSVM-PSO) is accessible to find out a classifier to detect multiclass attacks. This paper will extend the proposed techniques to new computing environments Mobile Ad-Hoc Networks to detect anomalous physical or virtual nodes.
Antikainen, Tuomas Aura, and Mikko Särelä ,” Denial-of-Service Attacks in Bloom-Filter-Based Forwarding” IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 5, OCTOBER 2014. DOI: https://doi.org/10.1109/TNET.2013.2281614
Andreas Papalambrou “Detection, traceback and filtering of denial of service attacks in networked embedded systems” New Delhi, India — October 12 - 17, 2014. DOI: https://doi.org/10.1145/2668322.2668327
Rajya Lakshmi G.V, Anusha.K” Detection of Anomaly Network Traffic for Mobile Ad-hoc Network Using Fuzzy Logic” September- 2013.
Supriya Bamane, Rajesh Singh,” AODV Based Improved Method for Detecting Good Neighbor Nodes” Volume 3, Issue 7, July 2013.
Jiajia Liu, Student Member, IEEE, Xiaohong Jiang, Senior Member, IEEE, Hiroki Nishiyama, Member, IEEE, and Nei Kato, Senior Member, IEEE ,” generalized two-hop relay for flexible delay control in manets” ieee/acm transactions on networking, vol. 20, no. 6, december 2012. DOI: https://doi.org/10.1109/TNET.2012.2187923
Mohamed Nidhal MEJRI , Jalel BEN-OTHMAN ,” Entropy as a New Metric for Denial of Service Attack Detection in Vehicular Ad-hoc Networks MSWiM’14, September 21–26, 2014, Montreal, QC, Canada.
Rodrigo do Carmo, Marc Werner, and Matthias Hollick ,” Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks” Q2SWinet’12, October 24–25, 2012, Paphos, Cyprus DOI: https://doi.org/10.1145/2387218.2387228
Aminu mohammed, mohamed ould-khaoua, lewis m. Mackenzie and jamal abdulai,” adaptive counter-based broadcasting scheme in mobile ad hoc networks” hp-mosys’12, october 25, 2012, paphos, Cyprus.
Manikandan, S.P. and R. Manimegalai,” Survey On Mobile Ad Hoc Network Attacks And Mitigation Using Routing Protocols ” American Journal of Applied Sciences, 2012, 9 (11), 1796-1801. DOI: https://doi.org/10.3844/ajassp.2012.1796.1801
S.Ganapathy, P. Yogesh, and A.Kannan: "Intelligent agent based intrusion detection system using enhanced multiclass SVM", Computational Intelligence and Neuroscience, volume 2012, article ID 850259. DOI: https://doi.org/10.1155/2012/850259
Monita Wahengbam, Ningrinla Marchang: "Intrusion detection in MANET using fuzzy logic", 2012 IEEE.  QualNet Network simulator 5.0.2 "Programming guide". DOI: https://doi.org/10.1109/NCETACS.2012.6203324
C. Kruegel, D. Mutz, W. Robertson and F. Valeur, “Bayesian event classification for intrusion detection”, Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), (2003), pp. 14-23.
S. Mukherjee and N. Sharma, “Intrusion detection using naive Bayes classifier with feature reduction”, Procedia Technology, vol. 4, (2012), pp. 119-128.
M. J. Wei, L. C. Xia, J. G. Jin and C. Chen, “Research of Intrusion Detection Based on Clustering Analysis”, Proceedings of International Conference on Cybernetics and Informatics, (2012), pp. 1973 1979.
W. Tylman, “Misuse-based intrusion detection using Bayesian networks”, Proceedings of 3rd International Conference on Dependability of Computer Systems (DepCos), (2008), pp. 203-210.
V. Jyothsna, V. V. R. Prasad and K. M. Prasad, “A review of anomaly based intrusion detection systems”, International Journal of Computer Applications, vol. 28, no. 7, (2011), pp. 26-35.
R. Goel, A. Sardana and R. C. Joshi, “Parallel Misuse and Anomaly Detection Model”, International Journal of Network Security, vol. 14, no. 4, (2012), pp. 211-222.
J. McHugh, “Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory”, ACM Transactions on Information and System Security, vol. 3, no. 4, (2000), pp. 262-294. S. Hettich and S. D. Bay, “The UCI KDD Archive”, http://kdd.ics.uci.edu/databases kddcup99/kddcup99.html, (1999)
How to Cite
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- The work described has not been formally published before, except in the form of an abstract or as part of a published lecture, review, thesis, or overlay journal.
- That it is not under consideration for publication elsewhere.
- That its release has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Authors who publish with International Journal of Engineering Technologies and Management Research agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or edit it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
For More info, please visit CopyRight Section