Skip to main content
Erschienen in: Cluster Computing 4/2015

01.12.2015

Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET

verfasst von: M. Poongodi, S. Bose

Erschienen in: Cluster Computing | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The DDoS attack is more vulnerable attack in the self structured and infra structure less MANET environment. The bot net based flooding attack is very cheap and easy to implement. Many detection and prevention mechanisms has been proposed to avoid DDoS attack. Here we have proposed the stochastic model of covariance matrix analysis in which the entropy difference has been computed by the frequency distribution of rule metrics against the threshold entropy periodically which in turn difference is highest can be controlled by reCAPTCHA controller to defend against DDoS attack. The prevention mechanism by trust evaluation using clustering methodology used to identify the attacker and reduce the cost of detection mechanism. The Aumann agreement theorem based trust re-evaluation is also proposed in order to reduce the false positive and negative probabilities, such that the accuracy of the system is enhanced. Finally the nodes identified as attacker by their trust values will be evicted and rekeying has been done. The experimental analysis in NS2 with CAIDA dataset shows true positive rate and detection rate is high in the proposed mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Poongodi, M., Bose, S.: Design of intrusion detection and prevention system (IDPS) using DGSOTFC in collaborative protection networks. In: 2013 fifth international conference on advanced computing (ICoAC). IEEE, (2013) Poongodi, M., Bose, S.: Design of intrusion detection and prevention system (IDPS) using DGSOTFC in collaborative protection networks. In: 2013 fifth international conference on advanced computing (ICoAC). IEEE, (2013)
3.
Zurück zum Zitat Poongodi, M., Bose, S.: The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation. Adv. Nat. Appl. Sci. 9(6), 574–580 (2015) Poongodi, M., Bose, S.: The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation. Adv. Nat. Appl. Sci. 9(6), 574–580 (2015)
4.
Zurück zum Zitat Yin, M., Feng, J., Tang, Y.: An overview on node behavior trust evaluation in ad hoc network. Advances in Wireless Sensor Networks. Springer, Berlin (2013) Yin, M., Feng, J., Tang, Y.: An overview on node behavior trust evaluation in ad hoc network. Advances in Wireless Sensor Networks. Springer, Berlin (2013)
5.
Zurück zum Zitat Cho, J.-H., Chen, I.-R.: Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wirel. Netw. 16(4), 1157–1173 (2010)MathSciNetCrossRef Cho, J.-H., Chen, I.-R.: Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wirel. Netw. 16(4), 1157–1173 (2010)MathSciNetCrossRef
6.
Zurück zum Zitat Lang, R., Deng, Z.: Data distribution algorithm using time based weighted distributed hash tables. In: Proceedings of 7th international conference on grid and cooperative computing, pp. 210–213, 24–26 Oct 2008 Lang, R., Deng, Z.: Data distribution algorithm using time based weighted distributed hash tables. In: Proceedings of 7th international conference on grid and cooperative computing, pp. 210–213, 24–26 Oct 2008
7.
Zurück zum Zitat Zhang, H., Goel, A., Govindan, R.: Improving lookup latency in distributed hash table systems using random sampling. IEEE/ACM Trans. Netw. 13(5), 1121–1134 (2005)CrossRef Zhang, H., Goel, A., Govindan, R.: Improving lookup latency in distributed hash table systems using random sampling. IEEE/ACM Trans. Netw. 13(5), 1121–1134 (2005)CrossRef
8.
Zurück zum Zitat Xia, P., Wu, M., Wang, K., Chen, X.: Identity-based fully distributed certificate authority in an OLSR MANET’. 4th international conference on wireless communications, networking and mobile computing, 2008. WiCOM ’08, pp. 1–4, 12–14 Oct 2008 Xia, P., Wu, M., Wang, K., Chen, X.: Identity-based fully distributed certificate authority in an OLSR MANET’. 4th international conference on wireless communications, networking and mobile computing, 2008. WiCOM ’08, pp. 1–4, 12–14 Oct 2008
9.
Zurück zum Zitat Thostle, J.: Applying network address encryption to anonymity and preventing data exfiltration. Military communications conference, MILCOM 2008. IEEE 2008, pp. 1–7 (2008) Thostle, J.: Applying network address encryption to anonymity and preventing data exfiltration. Military communications conference, MILCOM 2008. IEEE 2008, pp. 1–7 (2008)
10.
Zurück zum Zitat Eissa, T., Razak, S.A., Ngadi, M.A.: Enhancing MANET security using secret public keys. In: International conference on future networks, pp. 130–134 (2009) Eissa, T., Razak, S.A., Ngadi, M.A.: Enhancing MANET security using secret public keys. In: International conference on future networks, pp. 130–134 (2009)
11.
Zurück zum Zitat Qin, Y., Huang, D.: A statistical traffic pattern discovery system for MANETs. IEEE Trans. Depend. Sec. Comput. 11(2), 181–192 (2014)MathSciNetCrossRef Qin, Y., Huang, D.: A statistical traffic pattern discovery system for MANETs. IEEE Trans. Depend. Sec. Comput. 11(2), 181–192 (2014)MathSciNetCrossRef
12.
Zurück zum Zitat Biswas, S., Dey, P.: Secure check pointing-recovery using trusted nodes in MANET. In: 4th international conference on computer and communication technology 2013, pp. 175–180 Biswas, S., Dey, P.: Secure check pointing-recovery using trusted nodes in MANET. In: 4th international conference on computer and communication technology 2013, pp. 175–180
13.
Zurück zum Zitat François, J., Aib, I., Boutaba, R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Netw. (TON) 20(6), 1828–1841 (2012) François, J., Aib, I., Boutaba, R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Netw. (TON) 20(6), 1828–1841 (2012)
14.
Zurück zum Zitat Luo, F., Khan, L., Bastani, F., Yen, I.L., Zhou, J.: A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles. Bioinformatics 20, 2605–2617 (2004)CrossRef Luo, F., Khan, L., Bastani, F., Yen, I.L., Zhou, J.: A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles. Bioinformatics 20, 2605–2617 (2004)CrossRef
15.
Zurück zum Zitat Perkins, D.D.: Factors affecting the performance of ad hoc networks. In: IEEE international conference on communications, vol. 4, pp. 2048–2052 (2002) Perkins, D.D.: Factors affecting the performance of ad hoc networks. In: IEEE international conference on communications, vol. 4, pp. 2048–2052 (2002)
16.
Zurück zum Zitat Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63, 4647–4658 (2014)CrossRef Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63, 4647–4658 (2014)CrossRef
Metadaten
Titel
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET
verfasst von
M. Poongodi
S. Bose
Publikationsdatum
01.12.2015
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 4/2015
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-015-0496-y

Weitere Artikel der Ausgabe 4/2015

Cluster Computing 4/2015 Zur Ausgabe

Premium Partner