Open Access   Article Go Back

DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet

Shalini Priya1 , Koyel Roy2 , Ira Nath3 , Dharmpal Singh4

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-18 , Page no. 35-38, May-2019

Online published on May 25, 2019

Copyright © Shalini Priya, Koyel Roy, Ira Nath, Dharmpal Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shalini Priya, Koyel Roy, Ira Nath, Dharmpal Singh, “DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.35-38, 2019.

MLA Style Citation: Shalini Priya, Koyel Roy, Ira Nath, Dharmpal Singh "DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet." International Journal of Computer Sciences and Engineering 07.18 (2019): 35-38.

APA Style Citation: Shalini Priya, Koyel Roy, Ira Nath, Dharmpal Singh, (2019). DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet. International Journal of Computer Sciences and Engineering, 07(18), 35-38.

BibTex Style Citation:
@article{Priya_2019,
author = {Shalini Priya, Koyel Roy, Ira Nath, Dharmpal Singh},
title = {DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {18},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {35-38},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1330},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1330
TI - DPDOS: A New Heuristic to Detect and Prevent Distributed Denial of Service Attack Present in Vanet
T2 - International Journal of Computer Sciences and Engineering
AU - Shalini Priya, Koyel Roy, Ira Nath, Dharmpal Singh
PY - 2019
DA - 2019/05/25
PB - IJCSE, Indore, INDIA
SP - 35-38
IS - 18
VL - 07
SN - 2347-2693
ER -

           

Abstract

Increasing number of vehicles in utilize has conducted in the service to supply human and resource security. The present trend calls for the application of technology to automate safety measures in road traffic and since has been known as Intelligent Transport System (ITS). Vehicular Ad hoc Network is like a fork to Mobile Ad hoc Network, where the nodes are mobile vehicles moving in constrained road topology. VANET networks are visualized to be utilized in practical ITS systems around the world. A network standard has been grown as Wireless Access In Vehicular Environment (IEEE 802.11p) to be utilized in VANET which is an alteration to IEEE 802.11 standard. With each innovative technical applications particularly computers and network appliances, come novel safety challenges. Each network in present time is vulnerable to safety attacks and VANET is not the exception. The most notorious attack among all is the Distributed Denial of Service Attack which is obvious as unlike other safety attacks the data packets utilized in it are genuine and authorized packets. In this paper, a novel offensive measure for detection and prevention has been proposed.

Key-Words / Index Term

VANET, Ad-hoc, ITS, Mobile and DoS

References

[1] Kuppusamy, K., and S. Malathi. "An effective prevention of attacks using GI Time frequency algorithm under DDOS." International Journal of Network Security & Its Applications 3, no. 6 (2011): 249.
[2] Barford, Paul, Jeffery Kline, David Plonka, and Amos Ron. "A signal analysis of network traffic anomalies." In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement, pp. 71-82, ACM, 2002.
[3] Brutlag, Jake D. "Aberrant Behavior Detection in Time Series for Network Monitoring." In LISA, vol. 14, no. 2000, pp. 139-146. 2000.
[4] Naoumov, Naoum, and Keith Ross. "Exploiting p2p systems for ddos attacks." In Proceedings of the 1st international conference on Scalable information systems, p. 47. ACM, 2006.
[5] Ahmad, Shaikh Sharique, and HiralalSolunke. "Survey on VANET Based Self Adaptive Prioritized Traffic Signal Control." (2018).
[6] Sharma, Richa, and Jyoteesh Malhotra. "A Survey on Mobility Management Techniques in Vehicular Ad-hoc Network." In International Conference on Computing, Communication & Systems, 38, vol. 41. 2014.
[7] Agarwal, Pallavi. "Technical review on different applications, challenges and security in VANET." Journal of Multimedia Technology & Recent Advancements 4, no. 3 (2018): 21-30.
[8] Zhang, Jie. "A survey on trust management for vanets." In 2011 IEEE International Conference on Advanced Information Networking and Applications, pp. 105-112. IEEE, 2011.
[9] Gaikwad, Dhananjay Sudhakar, and Mukesh Zaveri. "VANET routing protocols and mobility models: A survey." In Trends in Network and Communications, pp. 334-342. Springer, Berlin, Heidelberg, 2011.
[10] Hamedani, Parisa Saraj, and Arshin Rezazadeh. "A New Two Level Cluster-Based Routing Protocol for Vehicular Ad Hoc NETwork (VANET)." In 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim), pp. 121-126. IEEE, 2018.