Title :
Effective defending against flood attack using stream-check method in tolerant network
Author :
Kuriakose, Divya ; Daniel, David
Author_Institution :
Comput. Sci. & Eng., Dr. N.G.P Inst. of Technol., Coimbatore, India
Abstract :
The disruption tolerant network (DTN) is appropriate for application where no communication infrastructure is present. Due to limitation of storage capacity DTN is vulnerable to flood attacks. In this paper proposed an intrusion detection scheme that use streaming node to monitor the network environment. Monitor that created three tables, RATE_LIMIT contains the list of the rate limit certificate of each node. DPT_TAB contains the delivery probability value according to the value of this table we can identified the attack happened or not. Streaming node is comparing the estimated value and actual delivery probability value calculated from node. If difference greater than a threshold value, the streaming node will listed as suspicious node. Instead of cross-check it used self-analysis approach for detection of inconsistency. It provided the delivery probability analysis for detection of and evaluation of the effectiveness and efficiency of this scheme. This scheme it effectively reduced propagation delay and increased the packet delivery ratio.
Keywords :
probability; security of data; DPT_TAB; RATE_LIMIT; delivery probability analysis; disruption tolerant network; flood attack; intrusion detection scheme; packet delivery ratio; propagation delay; storage capacity; stream-check method; Ad hoc networks; Delays; Floods; IP networks; Limiting; Monitoring; Routing; Disruption Tolerant Network; Flood Attack; delivery probability;
Conference_Titel :
Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on
Conference_Location :
Coimbatore
DOI :
10.1109/ICGCCEE.2014.6921381