Concentrating on the influence of DDoS applied to ad hoc networks, we introduced three classic queue management algorithms: Drop-Tail, random early detection (RED), and random exponential marking (REM). We analyzed and compared the defensive abilities of these algorithms applied to ad hoc networks with NS2 under DDoS attack. The results showed that active queue management algorithms, such as REM and RED, exhibited stronger defensive abilities than the passive queue management algorithm Drop-Tail under medium- and small-scale DDoS attacks; however, under large-scale DDoS attack, all three algorithms exhibited insufficient defensive capabilities. This means that other defense schemes, such as network detection, must be integrated into securit...
This study aims at the evaluation of queuing algorithms using NS2 simulator. The recent LDDoS attack...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
We present a two-tier coordination approach for detecting and mitigating DDoS attacks. The first tie...
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks be...
In the multimedia applications over the mobile ad hoc networks, the goodput and delay performance of...
Congestion-targeted RoQ (reduction of quality of service) DDoS (distributed denial of service) attac...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper discusses an improved mechanism to mitigate the DDoS attack in Mobile Ad-hoc Network (MAN...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
AbstractDue to emergence of wireless networks and immense use of hand held devices, wireless network...
exhaust victim’s bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS a...
In this paper we focus on alleviating malicious traffic from DDoS attacks since many famous websites...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
This study aims at the evaluation of queuing algorithms using NS2 simulator. The recent LDDoS attack...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
We present a two-tier coordination approach for detecting and mitigating DDoS attacks. The first tie...
The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks be...
In the multimedia applications over the mobile ad hoc networks, the goodput and delay performance of...
Congestion-targeted RoQ (reduction of quality of service) DDoS (distributed denial of service) attac...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad ...
This paper discusses an improved mechanism to mitigate the DDoS attack in Mobile Ad-hoc Network (MAN...
This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service ...
AbstractDue to emergence of wireless networks and immense use of hand held devices, wireless network...
exhaust victim’s bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS a...
In this paper we focus on alleviating malicious traffic from DDoS attacks since many famous websites...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
This study aims at the evaluation of queuing algorithms using NS2 simulator. The recent LDDoS attack...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
We present a two-tier coordination approach for detecting and mitigating DDoS attacks. The first tie...