Research Article Open Access

DETECTION OF FLOOD ATTACKS IN DTN USING RATE LIMITER TECHNIQUE

C. Balamurugan1, M. Viswanathan1, T. Abhishek Kumar1 and G. S. Raj1
  • 1 VEL Tech University, India

Abstract

Flood attacks means a network becomes so weighed down with packets, caused by the attackers. It prevents packets being sent/received between the nodes in the network. There are many methods adopted to prevent flood attacks in other networks, but none has been installed successfully for DTN’s. Disruption tolerant network is a network, developed in such a manner that intermittent communication problems have very low effect on the outcome of the result. However, due to the limited network resources in this network such as buffer space and bandwidth, it is liable to flood attacks. In order to protect resources and defend against flood attacks, the rate limiting technique should be adopted. In which each node must be set up with a restriction over the number of packets it can send to the network and number of duplicates that can be created for each packets, such as rate limit L and rate limit R respectively. However flood attacks are caused even in application level resulting in losses of resources such as CPU and sockets. So, technique for detection of application level floods attacks is implemented by verifying DNS query with a specific tool and validating it with mysql database.

Journal of Computer Science
Volume 10 No. 7, 2014, 1216-1221

DOI: https://doi.org/10.3844/jcssp.2014.1216.1221

Submitted On: 4 December 2013 Published On: 19 February 2014

How to Cite: Balamurugan, C., Viswanathan, M., Kumar, T. A. & Raj, G. S. (2014). DETECTION OF FLOOD ATTACKS IN DTN USING RATE LIMITER TECHNIQUE. Journal of Computer Science, 10(7), 1216-1221. https://doi.org/10.3844/jcssp.2014.1216.1221

  • 3,364 Views
  • 2,750 Downloads
  • 4 Citations

Download

Keywords

  • Flood Attacks
  • DTN
  • Disruption Tolerant Networks