This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc networks where nodes must exchange information really fast
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ...
The application layer in the Internet protocol suite offers a significant degree of freedom regardin...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of S...
While there are significant advances in information technology and infrastructure which offer new op...
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games p...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
Due to the development of easy-to-use software, distributed denial of service attacks have gone from...
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks be...
AbstractDistributed Denial of Service (DDoS) attacks are the most common and easiest attacks to prop...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
Concentrating on the influence of DDoS applied to ad hoc networks, we introduced three classic queue...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ...
The application layer in the Internet protocol suite offers a significant degree of freedom regardin...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of S...
While there are significant advances in information technology and infrastructure which offer new op...
Game theory offers a promising approach toward modeling cyber attacks and countermeasures as games p...
As cyber attacks continue to grow in number, scope, and severity, the cyber security problem has bec...
Due to the development of easy-to-use software, distributed denial of service attacks have gone from...
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks be...
AbstractDistributed Denial of Service (DDoS) attacks are the most common and easiest attacks to prop...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
Concentrating on the influence of DDoS applied to ad hoc networks, we introduced three classic queue...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhol...
In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ...
The application layer in the Internet protocol suite offers a significant degree of freedom regardin...