Security against DoS attack in mobile IP communication
As like as wired communication and mobile ad hoc networking, mobile IP communication is also vulnerable to different kinds of attack. Among different kinds of attack Denial-of-Service (DoS) is a great threat for mobile IP communication. In this paper we proposed to imply a lightweight packet filteri...
| Main Authors: | Parvin, S., Ali, S., Han, Song, Dillon, Tharam S. |
|---|---|
| Other Authors: | Atilla Elci |
| Format: | Conference Paper |
| Published: |
ACM
2009
|
| Subjects: | |
| Online Access: | http://doi.acm.org/10.1145/1626195.1626234 http://hdl.handle.net/20.500.11937/25422 |
Similar Items
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Targeting of lamivudine into the HIV reservoir in mesenteric and peripheral lymph nodes
by: Wong, Abigail
Published: (2024)
by: Wong, Abigail
Published: (2024)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Working with sexual offenders: strength-based approaches and desistance factors
by: Pryboda, Jennifer
Published: (2015)
by: Pryboda, Jennifer
Published: (2015)
Wilful blindness or blissful ignorance? The United States and the successful denucelarization of Iraq
by: Ryan, Maria
Published: (2014)
by: Ryan, Maria
Published: (2014)
On the matter of classifying node connections
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Multi-level mobile cache consistency schemes based on application requirements
by: Mahmoud Yagoub, Doha Elsharief
Published: (2012)
by: Mahmoud Yagoub, Doha Elsharief
Published: (2012)
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009)
by: Potdar, Vidyasagar, et al.
Published: (2009)
Applications of wireless sensor networks in pharmaceutical industry
by: Potdar, M., et al.
Published: (2009)
by: Potdar, M., et al.
Published: (2009)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Energy-efficient medium access control strategy for cooperative wireless networks
by: Sami, Mahmoud
Published: (2016)
by: Sami, Mahmoud
Published: (2016)
Defining trustworthiness in service oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
A fast community detection method in bipartite networks by distance dynamics
by: Sun, Hong-Liang, et al.
Published: (2018)
by: Sun, Hong-Liang, et al.
Published: (2018)
Defining reputation in service oriented environment
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Trust issues in a service oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Ontological manifestations of trust for service oriented environment
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)
by: Wietrzyk, Bartosz
Published: (2008)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Secure transactions using mobile agents with TTP
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Trustworthiness measurement methodology for e-business
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
Mitigating hidden node problem in an IEEE 802.16 failure resilient multi-hop wireless backhaul
by: Chai, Pey San Nancy
Published: (2011)
by: Chai, Pey San Nancy
Published: (2011)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
by: Izaddoost, Alireza
Published: (2008)
by: Izaddoost, Alireza
Published: (2008)
Network security performance analysis of mobile voice over IP application (mVoIP) : kakao talk, telegram, facebook messenger and whatsApp / Nur Syafiqa Bismi
by: Bismi, Nur Syafiqa
Published: (2020)
by: Bismi, Nur Syafiqa
Published: (2020)
Cooperative Localisation of a GPS-Denied UAV in 3-Dimensional Space Using Direction of Arrival Measurements
by: Russell, J.S., et al.
Published: (2017)
by: Russell, J.S., et al.
Published: (2017)
Community Perception of Mobile Payment in e-Government Services
by: Ahsan, A., et al.
Published: (2012)
by: Ahsan, A., et al.
Published: (2012)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A methodology to quantify failure for risk-based decision support system in digital business ecosystems
by: Hussain, Omar, et al.
Published: (2007)
by: Hussain, Omar, et al.
Published: (2007)
Embedding of fine features in multi-scale electromagnetic models
by: Biwojno, Konrad P.
Published: (2006)
by: Biwojno, Konrad P.
Published: (2006)
The development strategies of high speed railway new towns in China: Wuxi East new town
by: Pan, Qiongyu
Published: (2017)
by: Pan, Qiongyu
Published: (2017)
Trust ontology for service-oriented environment
by: Hussain, Farookh, et al.
Published: (2006)
by: Hussain, Farookh, et al.
Published: (2006)
A methodology for determining the creditability of recommending agents
by: Hussain, Omar, et al.
Published: (2006)
by: Hussain, Omar, et al.
Published: (2006)
Trust onology for service-oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
by: Gholizadeh, Somayyeh
Published: (2018)
by: Gholizadeh, Somayyeh
Published: (2018)
Achieving interoperability in mobility as a service: a data ecosystem leveraging Semantic Web Technologies
by: Essawy, Shams Khaled Elhosseny Ghazy
Published: (2024)
by: Essawy, Shams Khaled Elhosseny Ghazy
Published: (2024)
Similar Items
-
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018) -
Targeting of lamivudine into the HIV reservoir in mesenteric and peripheral lymph nodes
by: Wong, Abigail
Published: (2024) -
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010) -
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)