Loading

Preventing & Isolating Distributed Denial of Service (DDOS) attack in Wireless Mesh Networks (WMN’s)
Afshan Hassan1, Rajeev Sharma2, Gurbaj Singh3

1Afshan Hassan, Associate Professor, Department of CEC, Chitkara University Institute of Engineering and Technology Chitkara University Punjab, India.

2Rajeev Sharma, Associate Professor, Department of CEC, Chitkara University Institute of Engineering and Technology Chitkara University Punjab, India.

3Gurbaj Singh, Associate Professor, Department of CEC, Chitkara University Institute of Engineering and Technology Chitkara University Punjab, India.

Manuscript received on 20 August 2019 | Revised Manuscript received on 27 August 2019 | Manuscript Published on 26 August 2019 | PP: 447-454 | Volume-8 Issue-9S August 2019 | Retrieval Number: I10710789S19/19©BEIESP | DOI: 10.35940/ijitee.I1071.0789S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless Mesh networks (WMN’s) are prone to a number of attacks & these attacks compromise the security of these networks. Attaining security in these networks is a challenging task. It is logical to consider that there are many types of scripts in the internet. The virus can either be a key logger or somebody else’s mischief. With this script we can steal any information. Since the existence of virus cannot be ignored, therefore the authors have tried to present their work on first detecting it and later on fixing it. With the help of different protocols present in the Application Layer, a hacker takes information out of the script. The authors have used Covert Channel, which has been mentioned in many essays. Now with the help of this channel, the information will go to all and it will not go to any of the informatics. This research proposal envisions a methodology to first detect the selfish node in the network & later on provides a technique for mitigation of the same.NS2 simulator has been used to simulate & analyze the performance of our proposed methodology for Open Shortest Path First (OSPF) protocol in WMN’s.

Keywords: Wireless Mesh Networks(WMN’s), Distributed Denial Of Service (DDoS), covert channel, Media Access Control (MAC), Open Shortest Path First(OSPF),Switch port analyzer, Intrusion Detection Systems(IDS), Packet Delivery Ratio (PDR).
Scope of the Article: Wireless Mesh Networks and Protocols