Distributed Detection of DoS Using Clock Values in Wireless Broadband Networks

Provided by: International Journal of Engineering and Advanced Technology (IJEAT)
Topic: Mobility
Format: PDF
Wireless broadband networks are most vulnerable to denial-of-service attacks where attackers can disrupt legitimate communication between hosts in a network by flooding unwanted traffic between legitimate hosts. Flooding attack at the transport layer affects the TCP's 3-way handshake process, thereby denying the services of TCP. It also denies the services of UDP. This paper proposes a novel flooding attack, the most severe denial-of-service attack that occurs at the transport layer of the internet. The main objective of this approach is to install local and global monitoring agents at various points in order to monitor and filter real-time TCP traffic and UDP traffic thereby allowing legitimate traffic to flow in the network during attack traffic filtration process and to avoid buffer overflow at the monitoring agents.

Find By Topic