Towards DoS attack prevention based on clustering architecture in mobile IP communication
Mobile IP communication, like wired communication and mobile ad hoc networking, is vulnerable to Denial-of-Service (DoS) attacks. In this paper, we propose using a lightweight packet filtering technique in different domains and base stations to reduce/eliminate the threat of DoS attacks on mobile IP...
| Main Authors: | Parvin, S., Sohrab, A., Singh, Jaipal, Hussain, Farookh Khadeer, Han, Song |
|---|---|
| Other Authors: | Adriano Carvalho |
| Format: | Conference Paper |
| Published: |
IEEE Industrial Electronics Society
2009
|
| Online Access: | http://hdl.handle.net/20.500.11937/24369 |
Similar Items
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
Review of SIP based DoS attacks
by: Jama, Abdirisaq M., et al.
Published: (2016)
by: Jama, Abdirisaq M., et al.
Published: (2016)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Design and implementation of a lightweight security model to prevent IEEE 802.11 wireless DoS attacks.
by: Malekzadeh, Mina, et al.
Published: (2011)
by: Malekzadeh, Mina, et al.
Published: (2011)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Validating reliability of OMNeT++ in wireless networks DoS attacks: simulation vs. testbed.
by: Mina, Malekzadeh, et al.
Published: (2011)
by: Mina, Malekzadeh, et al.
Published: (2011)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Identifying DOS attacks using data pattern analysis
by: Salem, Mohammed, et al.
Published: (2008)
by: Salem, Mohammed, et al.
Published: (2008)
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
A combinational approach for trust establishment in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Prepaid And Postpaid Voice Over IP (VoIP) Architecture For Rural Areas
by: Ismail, Mohd Nazri
Published: (2007)
by: Ismail, Mohd Nazri
Published: (2007)
Comparative study based on DOS ATTACK at network layer in wired and wireless network / Norfarina Nordin
by: Nordin, Norfarina
Published: (2020)
by: Nordin, Norfarina
Published: (2020)
Real-time public group collaboration using IP multicast label filters
by: Singh, Jaipal, et al.
Published: (2009)
by: Singh, Jaipal, et al.
Published: (2009)
Dynamic real-time IP-based publish-subscribe group collaboration using multicast label filters
by: Singh, Jaipal, et al.
Published: (2009)
by: Singh, Jaipal, et al.
Published: (2009)
The impact of security on VoIP call quality
by: Radmand, Pedram, et al.
Published: (2011)
by: Radmand, Pedram, et al.
Published: (2011)
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A hybrid service metadata clustering methodology in the digital ecosystems environment
by: Dong, Hai, et al.
Published: (2009)
by: Dong, Hai, et al.
Published: (2009)
Scale-dependency in IP-based positioning of network clusters
by: Delfos, Jacob, et al.
Published: (2008)
by: Delfos, Jacob, et al.
Published: (2008)
"Do it yourself moves and changes" PBXoIP system
by: Abd. Rahman, Farah Adibah
Published: (2006)
by: Abd. Rahman, Farah Adibah
Published: (2006)
VoIP: making secure calls and maintaining high call quality
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Release currents of IP₃ receptor channel clusters and concentration profiles
by: Thul, Ruediger, et al.
Published: (2004)
by: Thul, Ruediger, et al.
Published: (2004)
AMP – a novel architecture for IP-based Mobility management
by: Wan Hazlina, Hassan, et al.
Published: (2008)
by: Wan Hazlina, Hassan, et al.
Published: (2008)
AMP - a novel architecture for IP-based mobility management
by: Hassan, Wan H., et al.
Published: (2008)
by: Hassan, Wan H., et al.
Published: (2008)
Communicating recommendations in a service-oriented environment
by: Hussain, Omar, et al.
Published: (2007)
by: Hussain, Omar, et al.
Published: (2007)
Network based filtering architecture on a shared multicast tree
by: Singh, Jaipal, et al.
Published: (2006)
by: Singh, Jaipal, et al.
Published: (2006)
Performance of a shared tree multicast label filter architecture
by: Singh, Jaipal, et al.
Published: (2005)
by: Singh, Jaipal, et al.
Published: (2005)
Implementing label filters on a shared tree mobile multicast architecture
by: Singh, Jaipal, et al.
Published: (2005)
by: Singh, Jaipal, et al.
Published: (2005)
The dos and don'ts during thunderstorms
by: The Star
Published: (2019)
by: The Star
Published: (2019)
Similar Items
-
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009) -
Review of SIP based DoS attacks
by: Jama, Abdirisaq M., et al.
Published: (2016) -
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018) -
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017) -
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)