WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Modeling and Detection Offlooding-Based Denial-of-Service Attack in Wireless AD HOC Network using Bayesian Inference

A Dinesh Kumar Dinesh Kumar

Download Paper

Paper Contents

Abstract

Wireless ad hoc networks are widely useful in locations where the existing infrastructure is difficult to use, especially during the situations like flood, earthquakes, and other natural or man-made calamities. Lack of centralized management and absence of secure boundaries make these networks vulnerable to various types of attacks. Moreover, the mobile nodes used in these networks have limited computational capability, memory, and battery backup. Flooding-based denial-of-service (DoS) attack, which results in denial of sleep attack, targets the mobile nodes constrained resources which results in excess consumption of battery backup. In SYN flooding-based DoS attack, the attacker sends a large number of spoofed SYN packets which not only overflow the target buffer but also creates network congestion. The present article is divided into three parts: mathematical modeling for SYN traffic in the network using Bayesian inference; proving the equivalence of Bayesian inference with exponential weighted moving average; and 3) develop an efficient algorithm for the detection of SYN flooding attack using Bayesian inference. Based on the comprehensive evaluation using mathematical modelling and simulation, the proposed method can successfully defend any type of flooding-based DoS attack in wireless ad hoc network with higher detection accuracy and extremely lower false detection rate.

Copyright

Copyright © 2023 A Dinesh Kumar. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30400002043
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us