scholarly journals Preventing & Isolating Distributed Denial of Service (DDOS) attack in Wireless Mesh Networks (WMN's)

Wireless Mesh networks (WMN’s) are prone to a number of attacks & these attacks compromise the security of these networks. Attaining security in these networks is a challenging task. It is logical to consider that there are many types of scripts in the internet. The virus can either be a key logger or somebody else's mischief. With this script we can steal any information. Since the existence of virus cannot be ignored, therefore the authors have tried to present their work on first detecting it and later on fixing it. With the help of different protocols present in the Application Layer, a hacker takes information out of the script. The authors have used Covert Channel, which has been mentioned in many essays. Now with the help of this channel, the information will go to all and it will not go to any of the informatics. This research proposal envisions a methodology to first detect the selfish node in the network & later on provides a technique for mitigation of the same.NS2 simulator has been used to simulate & analyze the performance of our proposed methodology for Open Shortest Path First (OSPF) protocol in WMN’s.




Information ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 544
Author(s):  
Vinicius da Silva Faria ◽  
Jéssica Alcântara Gonçalves ◽  
Camilla Alves Mariano da Silva ◽  
Gabriele de Brito Vieira ◽  
Dalbert Matos Mascarenhas

Denial of service (DoS) attacks play a significant role in contemporary cyberspace scenarios. A variety of different DoS attacks pollute networks by exploring various vulnerabilities. A group of DoS called application DoS attacks explore application vulnerabilities. This work presents a tool that detects and blocks an application DoS called Slowloris on wireless mesh networks (WMNs). Our tool, called SDToW, is designed to effectively use the structure of the WMNs to block the Slowloris attack. SDToW uses three different modules to detect and block the attack. Each module has its specific tasks and thus optimizes the overall detection and block efficiency. Our solution blocks the attacker on its first WMN hop, reducing the malicious traffic on the network and avoiding further attacks from the blocked user. The comparison results show that SDToW performs with 66.7% less processing consumption and 89.1% less memory consumption than Snort. Our solution does not limit the number of parallel connections per user. Hence, by avoiding this limitation, SDToW has a lower incidence of false positive errors than Snort.



Author(s):  
Shingo Yamaguchi ◽  
Brij Gupta

This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web site “Krebs on Security” came under a massive distributed denial of service (DDoS) attack. It reached twice the size of the largest attack in history. This attack was caused by a new type of malware called Mirai. Mirai primarily targets IoT devices such as security cameras and wireless routers. IoT devices have some properties which make them malware attack's targets such as large volume, pervasiveness, and high vulnerability. As a result, a DDoS attack launched by infected IoT devices tends to become massive and disruptive. Thus, the threat of Mirai is an extremely important issue. Mirai has been attracting a great deal of attention since its birth. This resulted in a lot of information related to IoT malware. Most of them came from not academia but industry represented by antivirus software makers. This chapter summarizes such information.





2016 ◽  
Vol 58 (2) ◽  
Author(s):  
Kalman Graffi

AbstractThe Internet is one of the main communication platforms of our society. In many countries, communication contents and patterns are surveilled aiming to identify, punish or block undesired ideas. I focus with my research on fully decentralized and secure communication platforms which cannot be surveilled or switched off, on Android-based wireless mesh networks which support local communication that do not pass through the Internet, as well as on concepts for Internet-based democracy. My contributions aim for a practical usability in form of prototypes and software provided to potential users.



2020 ◽  
Vol 11 (2) ◽  
pp. 18-32
Author(s):  
Opeyemi Peter Ojajuni ◽  
Yasser Ismail ◽  
Albertha Lawson

The Internet of Things (IoT) allows different devices with internet protocol (IP) address to be connected together via the internet to collect, provide, store, and exchange data amongst themselves. The distributed denial of service (DDoS) attack is one of the inevitable challenges which should be addressed in the development of the IoT. A DDoS attack has the potential to render a victim's services unavailable, which can then lead to additional challenges such as website outage, financial loss, reputational damage and loss of confidential information. In this article, a framework of the SDN controller via an application programming interface (API) is compared to an existing framework. SDN provides a new architecture that can detect and mitigate a DDoS attack so that it makes the networking functionalities programmable via the API and also it centralizes the control management of the IoT devices. Experimental results show the capability of the SDN framework to analyze a real-time traffic of the SDN controller via the API by setting a control bandwidth usage threshold using the API.



Sign in / Sign up

Export Citation Format

Share Document