SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT

  • Divya Gautam
Keywords: Securing Mobile, Network, Cloud Environment

Abstract

Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. DDoS attacks are most important threats next to the accessibility of cloud services. Prevention mechanisms to protect next to DDoS attacks are not forever efficient on their own. Unite dissimilar method (load balancing, throttling and Honey pots) to build hybrid defense method, in meticulous with dissimilar cloud computing layers, is extremely recommended. In this paper, a variety of DDoS attacks have been presented. We as well highlighted the defense methods to counter attack dissimilar types DDoS attacks in the cloud environment. This paper proposes SVM-based algorithm to anomaly intrusion detection. A multiclass SVM algorithm with parameter optimized by PSO (MSVM-PSO) is accessible to find out a classifier to detect multiclass attacks. This paper will extend the proposed techniques to new computing environments Mobile Ad-Hoc Networks to detect anomalous physical or virtual nodes.

                                     

Downloads

Download data is not yet available.

References

Antikainen, Tuomas Aura, and Mikko Särelä ,” Denial-of-Service Attacks in Bloom-Filter-Based Forwarding” IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 5, OCTOBER 2014. DOI: https://doi.org/10.1109/TNET.2013.2281614

Andreas Papalambrou “Detection, traceback and filtering of denial of service attacks in networked embedded systems” New Delhi, India — October 12 - 17, 2014. DOI: https://doi.org/10.1145/2668322.2668327

Rajya Lakshmi G.V, Anusha.K” Detection of Anomaly Network Traffic for Mobile Ad-hoc Network Using Fuzzy Logic” September- 2013.

Supriya Bamane, Rajesh Singh,” AODV Based Improved Method for Detecting Good Neighbor Nodes” Volume 3, Issue 7, July 2013.

Jiajia Liu, Student Member, IEEE, Xiaohong Jiang, Senior Member, IEEE, Hiroki Nishiyama, Member, IEEE, and Nei Kato, Senior Member, IEEE ,” generalized two-hop relay for flexible delay control in manets” ieee/acm transactions on networking, vol. 20, no. 6, december 2012. DOI: https://doi.org/10.1109/TNET.2012.2187923

Mohamed Nidhal MEJRI , Jalel BEN-OTHMAN ,” Entropy as a New Metric for Denial of Service Attack Detection in Vehicular Ad-hoc Networks MSWiM’14, September 21–26, 2014, Montreal, QC, Canada.

Rodrigo do Carmo, Marc Werner, and Matthias Hollick ,” Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks” Q2SWinet’12, October 24–25, 2012, Paphos, Cyprus DOI: https://doi.org/10.1145/2387218.2387228

Aminu mohammed, mohamed ould-khaoua, lewis m. Mackenzie and jamal abdulai,” adaptive counter-based broadcasting scheme in mobile ad hoc networks” hp-mosys’12, october 25, 2012, paphos, Cyprus.

Manikandan, S.P. and R. Manimegalai,” Survey On Mobile Ad Hoc Network Attacks And Mitigation Using Routing Protocols ” American Journal of Applied Sciences, 2012, 9 (11), 1796-1801. DOI: https://doi.org/10.3844/ajassp.2012.1796.1801

S.Ganapathy, P. Yogesh, and A.Kannan: "Intelligent agent based intrusion detection system using enhanced multiclass SVM", Computational Intelligence and Neuroscience, volume 2012, article ID 850259. DOI: https://doi.org/10.1155/2012/850259

Monita Wahengbam, Ningrinla Marchang: "Intrusion detection in MANET using fuzzy logic", 2012 IEEE. [15] QualNet Network simulator 5.0.2 "Programming guide". DOI: https://doi.org/10.1109/NCETACS.2012.6203324

C. Kruegel, D. Mutz, W. Robertson and F. Valeur, “Bayesian event classification for intrusion detection”, Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), (2003), pp. 14-23.

S. Mukherjee and N. Sharma, “Intrusion detection using naive Bayes classifier with feature reduction”, Procedia Technology, vol. 4, (2012), pp. 119-128.

M. J. Wei, L. C. Xia, J. G. Jin and C. Chen, “Research of Intrusion Detection Based on Clustering Analysis”, Proceedings of International Conference on Cybernetics and Informatics, (2012), pp. 1973 1979.

W. Tylman, “Misuse-based intrusion detection using Bayesian networks”, Proceedings of 3rd International Conference on Dependability of Computer Systems (DepCos), (2008), pp. 203-210.

V. Jyothsna, V. V. R. Prasad and K. M. Prasad, “A review of anomaly based intrusion detection systems”, International Journal of Computer Applications, vol. 28, no. 7, (2011), pp. 26-35.

R. Goel, A. Sardana and R. C. Joshi, “Parallel Misuse and Anomaly Detection Model”, International Journal of Network Security, vol. 14, no. 4, (2012), pp. 211-222.

J. McHugh, “Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory”, ACM Transactions on Information and System Security, vol. 3, no. 4, (2000), pp. 262-294. S. Hettich and S. D. Bay, “The UCI KDD Archive”, http://kdd.ics.uci.edu/databases kddcup99/kddcup99.html, (1999)

Published
2018-02-28
How to Cite
Gautam , D. (2018). SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT. International Journal of Engineering Technologies and Management Research, 5(2), 84-89. https://doi.org/10.29121/ijetmr.v5.i2.2018.617