메뉴 건너뛰기




Volumn 17, Issue 2, 2006, Pages 410-416

Flooding attack and defence in Ad hoc networks

Author keywords

Ad hoc flooding attack; Computer networks; Denial of service; Mobile Ad hoc networks; Routing protocol; Security

Indexed keywords

BANDWIDTH; COMMUNICATION; COMPUTER SIMULATION; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33747437914     PISSN: 16711793     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1004-4132(06)60070-4     Document Type: Article
Times cited : (47)

References (14)
  • 1
    • 0004134776 scopus 로고    scopus 로고
    • Mobile Ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations
    • RFC 2501
    • Corson S, Macker J. Mobile Ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. RFC 2501, 1999.
    • (1999)
    • Corson, S.1    Macker, J.2
  • 2
    • 0003597247 scopus 로고    scopus 로고
    • The dynamic source routing Protocol for mobile Ad hoc networks (DSR)
    • David Johnson B, David Maltz A, Yih-Chun Hu. The dynamic source routing Protocol for mobile Ad hoc networks (DSR). http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt, 2003.
    • (2003)
    • David, J.B.1    David, M.A.2    Hu, Y.-C.3
  • 3
    • 70350778105 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (AODV) routing
    • RFC 3561
    • Charles Perkins E, Elizabeth M Belding-royer, Samir Das R. Ad hoc on-demand distance vector (AODV) routing, RFC 3561, http://www.ietf.org/rfc/rfc3561.txt, 2003.
    • (2003)
    • Charles, P.E.1    Belding-Royer, E.M.2    Samir, D.R.3
  • 5
    • 0003553457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
    • RFC 2267
    • Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267, 1998.
    • (1998)
    • Ferguson, P.1    Senie, D.2
  • 6
    • 24744471287 scopus 로고    scopus 로고
    • H-02: SUN's TCP SYN flooding solutions
    • CIAC
    • CIAC, H-02: SUN's TCP SYN Flooding Solutions, Information Bulletin, 1996.
    • (1996) Information Bulletin
  • 9
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Atlanta, Georgia, USA
    • Hu Yichun, Adrian Perrig, David Johnson B. Ariadne: A secure on-demand routing protocol for ad hoc networks. Proceedings of the MobiCom, Atlanta, Georgia, USA, 2002: 12-23.
    • (2002) Proceedings of the MobiCom , pp. 12-23
    • Hu, Y.1    Perrig, A.2    David, J.B.3
  • 11
    • 14844291262 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • New York City
    • Wang Haining, Zhang Danlu, Kang Shin G. Detecting SYN flooding attacks. IEEE INFOCOM'2002, New York City, 2002, 21(1): 1530-1539.
    • (2002) IEEE INFOCOM'2002 , vol.21 , Issue.1 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Kang, S.G.3
  • 13
    • 3543097593 scopus 로고    scopus 로고
    • SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks
    • Berkeley, USA
    • Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song, SIFF: A stateless internet flow filter to mitigate DDoS flooding attacks. IEEE Symposium on Security and Privacy, Berkeley, USA, 2004: 130-144.
    • (2004) IEEE Symposium on Security and Privacy , pp. 130-144
    • Yaar, A.1    Perrig, A.2    Song, D.X.3
  • 14
    • 85030603055 scopus 로고    scopus 로고
    • Kevin fall the as manual
    • Kevin Fall The as manual, http://www.isi.edu/nsnam/ns/index.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.