메뉴 건너뛰기




Volumn 4, Issue 2, 2007, Pages 227-234

Pulsing RoQ DDoS attack and defense scheme in mobile ad Hoc networks

Author keywords

Distributed denial of service; Mobile ad hoc network; Network security; Reduction of quality attack

Indexed keywords

CONGESTION-BASED; DELAY PERFORMANCE; DISTRIBUTED DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; FLOODING ATTACKS; NETWORK CAPACITY; NETWORK SIMULATION; RESPONSE MECHANISMS;

EID: 44549083472     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (24)

References (13)
  • 1
    • 11244252132 scopus 로고    scopus 로고
    • Denial of service resilience in ad hoc networks
    • Philadelphia, Pennsylvania, USA
    • I. Aad, J. P. Hubaux, and E. W. Knightly,"Denial of service resilience in ad hoc networks," in Proceed-ings of MOBICOM2004, pp. 202-215, Philadelphia, Pennsylvania, USA, Sept. 2004.
    • (2004) Proceed-ings of MOBICOM2004 , pp. 202-215
    • Aad, I.1    Hubaux, J.P.2    Knightly, E.W.3
  • 2
    • 25844458510 scopus 로고    scopus 로고
    • Reduction of quality (RoQ) attacks on internet end-systems
    • Miami, Florida
    • M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of quality (RoQ) attacks on internet end-systems," in INFOCOM2005, vol. 2, pp. 1362-1372, Miami, Florida, Mar. 2005.
    • (2005) INFOCOM2005 , vol.2 , pp. 1362-1372
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3    Zhang, Y.4
  • 4
    • 0037003792 scopus 로고    scopus 로고
    • Denial of service attacks at the MAC layer in wireless ad hoc networks
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of service attacks at the MAC layer in wireless ad hoc networks," in IEEE MILCOM, vol. 2, pp. 1118-1123, Oct. 2002.
    • (2002) IEEE MILCOM , vol.2 , pp. 1118-1123
    • Gupta, V.1    Krishnamurthy, S.2    Faloutsos, M.3
  • 5
    • 84874857048 scopus 로고    scopus 로고
    • IEEE, IEEE Standard for Information Technology V Telecommunications and Information Exchange be-tween Systems V Specific Requirements V Part 11: Wireless LAN MAC and PHY Specifications, IEEE Std 802.11-1999, IEEE, New York
    • IEEE, IEEE Standard for Information Technology V Telecommunications and Information Exchange be-tween Systems V Specific Requirements V Part 11: Wireless LAN MAC and PHY Specifications, IEEE Std 802.11-1999, IEEE, New York, 1999.
    • (1999)
  • 6
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks
    • Technologies, Architectures, and Protocols for Computer Commu-nications (SIGCOMM2003)
    • A. Kuzmanovic and E.W. Knightly, "Low-rate TCP-targeted denial of service attacks," in Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Commu-nications (SIGCOMM2003), pp. 75-86, Karlsruhe, Germany, Aug. 2003.
    • (2003) Proceedings of the 2003 Conference on Applications , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 8
    • 0042474409 scopus 로고    scopus 로고
    • Stability of multipacket slotted aloha with selfish users and perfect information
    • San Francisco, CA
    • A. B. MacKenzie and S. B. Wicker, "Stability of multipacket slotted aloha with selfish users and perfect information," in Proceedings of IEEE INFOCOM 2003, vol. 3, pp. 1583-1590, San Francisco, CA, Apr. 2003.
    • (2003) Proceedings of IEEE INFO-COM 2003 , vol.3 , pp. 1583-1590
    • MacKenzie, A.B.1    Wicker, S.B.2
  • 10
    • 84874833749 scopus 로고    scopus 로고
    • The CMU Monarch Project, Wireless and Mobility Extension to ns
    • The CMU Monarch Project, Wireless and Mobility Extension to ns.
  • 11
    • 84874828095 scopus 로고    scopus 로고
    • The Network Simulator NS-2
    • The Network Simulator NS-2, http://www.isi.edu/nsnam/ns/index.html.
  • 12
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenge and solutions
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: Challenge and solutions," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47, Feb. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.