SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 440
Introducing Restricted Access Protocol To Enhance The Security And
Eliminate Ddos Attack
Indu Sarmal1, Sharanjit Singh2, Amardeep Singh3
1 Department of CSE, GNDU Regional Campus Gurdaspur, Punjab, India
2 Department of CSE, GNDU Regional Campus Gurdaspur, Punjab, India
3Department of CSE, GNDU Regional Campus Gurdaspur, Punjab, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – The manet is the technique which is used
in order to transfer the data among the nodes present
remotely as well as at lesser distance from the source.
The technique which is used will enhance the
communication among the nodes. With the
advancement in the technology problems also starts to
appear. These problems appear in terms of the attacks.
There are number of attacks which are possible when
data is being transmitted. One of the common attacks is
DDOS. The DDOS attack will jam the traffic and will
cause the deadlock in the system. The proposed system
will first of all perform the encryption and then
transmit the data forward. The data then will be
compared against the database of extensions to
determine any malicious activity.
Key Words: Manet, Traffic, Ddos, Malicious,
Extensions
1. INTRODUCTION
MANET is the mobile Ad-hoc network which is self
configuring system in which mobile devices are connected
without wires. Each device which is present in the MANET
is free to move in any direction. The traffic which is
unrelated to the current node must be forwarded to the
other nodes present on the network. These nodes may be
connected to the organization or it may be connected over
the internet. Internet will be used only if distance is larger.
MANET has large number of sensors associated with it.
The sensors will detect the path and direct the traffic from
source to the destination. Data Monitoring and Mining is
the common application of the MANET. The MANET is
exposed to very huge and large number of users. The
intension of the users may be uncertain. So MANET is
prone to attacks. There could be large number of attacks
which can take place over the MANET. Mainly there is one
Common attack and that will be DDOS. DDOS(Distributed
Daniel of Service Attack) will target a single system. The
system is infected by the Trojen. The system will then
transmit large number of packets towards the network.
This will cause the network bandwidth to be used heavily.
Hence the traffic will be jammed and deadlock will occur
over the network. There exist necessary conditions for the
deadlock. All the necessary conditions if satisfied
simultaneously then deadlock over the network will occur.
The necessary conditions will involve No Preemption,
Hold and Wait, Circular Wait and Mutual Exclusion. All
these conditions are satisfied through DDOS in order for
the deadlock to occur within the system. When DDOS
attack takes place then zombies are formulated. These
zombies are the processes which does terminates however
still remain in the memory. These zombies are removed if
DDOS handling mechanisms are used.
2. VARIOUS TYPES OF ATTACKS
The attacks on MANET are common all of these attacks are
describe through the following table.
Table -1: Name of the Table
Various Attacks External As Well As Internal
Passive attacks Active attacks
Eaves-
drop
ping
attacks,
traffic
analysis
and
monitoring
Mac
layer
Net-
Work
layer
Trans-
port
layer
Appli-
Cation
layer
Other
attack
Jam-
ming
Worm-
hole,
Black-
hole,
IP
spoofing,
Modifi
cations
Session
Hijac-
king,Syn
Flooding
Data
Corru-
ption
DOS,
DDOS
Flood-
ing,
Gray
Hole
All of these attacks will corrupt the data present within the
MANET nodes. So some sort of prevention mechanisms is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 441
required. In the proposed system we will suggest a
mechanism to overcome the DDOS attack.
3. EXISTING WORK
Large amount of work is done in the area of MANET
security. Some of the work which we have analyzed is in
the area of Attacks that takes place in case of MANET. [1]
Various routing protocols are considered in analyzed
work. The rules and regulations are suggested which must
be followed in order to ensure that data is transmitted
correctly towards the destination. [2] the work is also
being done in the area of determining the various attacks
on the MANET. The prevention mechanism are also
suggested in the existing work.[3] it is not easy to
accomplish security within MANET. Security challenges
and how we achieve security is suggested in the existing
work. [4] the routing protocols are considered and their
performance is compared with each other. Performance
comparison will be done in the existing work. The
performance comparison will be given in terms of a chart
which is easy to understand. [5] the MANET in recent
years has become popular. Lots of work has been done in
this area. Routing strategies are considered in this case.
This is one of the most difficult aspects of MANET. [6] due
to vulnerabilities in the MANET, large number of security
threats which are available. Security threats and solutions
are suggested. Security mechanisms if followed
successfully data can be secured. [7] Data will be
exchanged between the nodes present within the MANET.
Lack of infrastructure can cause deception. Trust is
difficult to be established due to this problem.[8] there are
number of routing protocols which are suggested. Routing
is important concept which is discussed in this case.
Various types of routing algorithms such as Hybrid ,
reactive and proactive routing algorithms are considered
in the existing work. [9] Network Security mechanisms
such as cryptography is also considered. The data which is
transmitted first of all encrypted and then transferred. At
the receiver ends the data is decrypted. There are very
numbers of vulnerabilities that exist within the MANET
because of which security threats are imposed. There
identification is compulsory which is suggested in the
analyzed work. In all the papers we have analyzed security
threats and there solutions are suggested. But the concept
of insider attack is not indicated. In the proposed scheme
the restricted access protocol is suggested. This protocol
will go to detect the intruder through questionnaires.
4. DATABASE OF EXTENSIONS
The database is maintained which will contain information
about all the extensions which are not understood by the
receiving node. The extension which is malicious will
cause DDOS attack. In order to prevent that the incoming
packet extension will be compared against the database of
extension(∑di). If match occurs then data will not be
transferred forwarded. This will detect the attack. The
procedure of encryption of data will be performed after
the extensions have been checked correctly. Hence extra
security feature is introduced in this case.
If ∑di=∑pi then
Malicious=1
Else
Malicious=0
End of if
5. ENCRYPTION
Encryption is the mechanism by which message is
converted into the form which may not be understood by
the hackers or malicious users. The encryption strategies
are large in number. We will follow RSA technique for the
encryption purpose. We have both public as well as
private key encryption mechanism available to be used. In
public key encryption source as well as destination both
knows about the key. But in private key encryption key is
hidden. In RSA algorithm both public as well as private
keys are used for encoding and decoding purpose. The
RSA algorithm will be as described below.
 Two large numbers are chosen which are denoted
as and
 Determine
 is the remainder or modulus for the
public and the private keys
 Determine
quotient: .
 Select a value which is of Integer such that 1
< < , and is co-
prime to ie: and share no factors
other than 1; gcd( , ) = 1.
 is the public key exponent
 Compute which satisfy
the Relation ie:
for some integer .
 will represent the private key
exponent.
6. RESTRICTED ACCESS PROTOCOL
In this protocol features of Encryption and restricted
extensions will be used. If the data is not malicious then its
extension will not match with the database of extensions.
Once approved the encryption process will be used to
enhance the security mechanisms. The DDOS attack will be
prevented since malicious data cannot be repeated and
hence blocked by the use of above said protocol. The DDOS
attack is shown through the diagram given below. The
RAP is efficient in order to prevent this type of attack.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 442
Features of encryption as well as malicious extension
checking are used in the proposed model.
Pre-compromised
computers
Diagram -1: Ddos attack on a node
7. CONCLUSIONS
The existing system uses the algorithms only to detect the
attacks which are generated from outside. This means
stress in given only to the external attacks. In the
proposed system insider attack is handled with the help of
RAP. The restricted access protocol will uses the
Encryption as well as database of extension. It will contain
the predefined answers from the users of the MANET. The
given answers will be compared against the predefined
answers. The experiment result indicates that the security
is increased by 80% by the use of this protocol.
REFERENCES
[1] A. Shrivastava and A. Shanmogavel, “Overview of
routing protocols in MANET’s and enhancements in
reactive protocols,” … Comput. Sci. …, 2005.
[2] J. G. Ponsam and R. Srinivasan, “A Survey on MANET
Security Challenges,, Attacks and its
Countermeasures,” Int. J. Emerg. Trends Technol.
Comput. Sci., vol. 3, no. 1, pp. 274–279, 2014.
[3] A. Dorri and S. R. Kamel, “Security Challenges in
Mobile Ad Hoc Networks: A Survey,” Int. J. Comput.
Sci. Eng. Surv., vol. 6, no. 1, pp. 15–29, 2015.
[4] H. Paul and P. Das, “Performance Evaluation of
MANET Routing Protocols,” Int. J. Comput. Sci. Issues,
vol. 9, no. 4, pp. 449–456, 2012.
[5] D. S. S. D. A. P. Dr.S.S.Dhenakaran, “An Overview of
Routing Protocols in Mobile Ad-Hoc Network,” Int. J.
Adv. Res. Comput. Sci. Softw. Eng., vol. 3, no. 2, pp. 251
– 259, 2013.
[6] W. Li and A. Joshi, “Security Issues in Mobile Ad Hoc
Networks-A Survey,” Dep. Comput. Sci. Electr. …, pp.
1–23, 2008.
[7] H. Zhao, “Security in Ad Hoc Networks,” Security, pp.
756–775, 2003.
[8] H. Kaur, V. Sahni, and M. Bala, “A Survey of Reactive,
Proactive and Hybrid Routing Protocols in MANET: A
Review,” Network, vol. 4, no. 3, pp. 498–500, 2013.
[9] T. Mamatha, “Network Security for MANETS,” no. 2,
pp. 65–68, 2012.
Attacker
Target

More Related Content

DOC
A table driven search approach for revelation and anticipation of sinkhole at...
PDF
Es34887891
PDF
IRJET- Survey on Phishing Attack Detection and Mitigation
PDF
Implementing a Robust Network-Based Intrusion Detection System
PDF
Survey on Host and Network Based Intrusion Detection System
PDF
An Extensive Survey of Intrusion Detection Systems
PDF
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
PDF
Network Vulnerability and Patching
A table driven search approach for revelation and anticipation of sinkhole at...
Es34887891
IRJET- Survey on Phishing Attack Detection and Mitigation
Implementing a Robust Network-Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
An Extensive Survey of Intrusion Detection Systems
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Network Vulnerability and Patching

What's hot (16)

PDF
The use of honeynet to detect exploited systems (basic version)
PDF
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
PDF
An Approach to for Improving the Efficiency of IDS System Using Honeypot
PDF
IRJET- Software Defined Network: DDOS Attack Detection
PDF
Survey on classification techniques for intrusion detection
PDF
Intrusion preventionintrusion detection
PDF
TACTiCS_WP Security_Addressing Security in SDN Environment
PDF
IRJET- Study of Hacking and Ethical Hacking
PDF
Intrusion detection system: classification, techniques and datasets to implement
PDF
Denial of Service Attack Defense Techniques
PDF
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
PDF
N44096972
PDF
Research of Intrusion Preventio System based on Snort
PPTX
RSAC 2021 Spelunking Through the Steps of a Control System Hack
DOC
Cst 630 Motivated Minds/newtonhelp.com
PDF
D03302030036
The use of honeynet to detect exploited systems (basic version)
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
An Approach to for Improving the Efficiency of IDS System Using Honeypot
IRJET- Software Defined Network: DDOS Attack Detection
Survey on classification techniques for intrusion detection
Intrusion preventionintrusion detection
TACTiCS_WP Security_Addressing Security in SDN Environment
IRJET- Study of Hacking and Ethical Hacking
Intrusion detection system: classification, techniques and datasets to implement
Denial of Service Attack Defense Techniques
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
N44096972
Research of Intrusion Preventio System based on Snort
RSAC 2021 Spelunking Through the Steps of a Control System Hack
Cst 630 Motivated Minds/newtonhelp.com
D03302030036
Ad

Similar to Introducing Restricted Access Protocol to Enhance the Security and Eliminate Ddos Attack (20)

PDF
IRJET- Machine Learning Processing for Intrusion Detection
PDF
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
PDF
A Survey on Data Intrusion schemes used in MANET
PDF
IRJET- A Review on Honeypots
PDF
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
PDF
Ak03402100217
PDF
IRJET- Secure Data Transmission from Malicious Attacks: A Review
PDF
A Review on various Security Attacks in Mobile Adhoc Network
PDF
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
PDF
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
PDF
Survey of Clustering Based Detection using IDS Technique
PDF
Secure masid secure multi agent system for intrusion detection-2
PDF
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
PDF
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
PDF
IRJET - A Secure Approach for Intruder Detection using Backtracking
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
PDF
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
PDF
Prevention based mechanism for attacks in Network Security
IRJET- Machine Learning Processing for Intrusion Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
A Survey on Data Intrusion schemes used in MANET
IRJET- A Review on Honeypots
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Ak03402100217
IRJET- Secure Data Transmission from Malicious Attacks: A Review
A Review on various Security Attacks in Mobile Adhoc Network
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Survey of Clustering Based Detection using IDS Technique
Secure masid secure multi agent system for intrusion detection-2
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
IRJET - A Secure Approach for Intruder Detection using Backtracking
International Journal of Computational Engineering Research(IJCER)
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Intrusion Detection System using AI and Machine Learning Algorithm
Prevention based mechanism for attacks in Network Security
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
composite construction of structures.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Well-logging-methods_new................
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
additive manufacturing of ss316l using mig welding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Project quality management in manufacturing
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
composite construction of structures.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Geodesy 1.pptx...............................................
bas. eng. economics group 4 presentation 1.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Well-logging-methods_new................
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
additive manufacturing of ss316l using mig welding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Lecture Notes Electrical Wiring System Components
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Project quality management in manufacturing
Mitigating Risks through Effective Management for Enhancing Organizational Pe...

Introducing Restricted Access Protocol to Enhance the Security and Eliminate Ddos Attack

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 440 Introducing Restricted Access Protocol To Enhance The Security And Eliminate Ddos Attack Indu Sarmal1, Sharanjit Singh2, Amardeep Singh3 1 Department of CSE, GNDU Regional Campus Gurdaspur, Punjab, India 2 Department of CSE, GNDU Regional Campus Gurdaspur, Punjab, India 3Department of CSE, GNDU Regional Campus Gurdaspur, Punjab, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – The manet is the technique which is used in order to transfer the data among the nodes present remotely as well as at lesser distance from the source. The technique which is used will enhance the communication among the nodes. With the advancement in the technology problems also starts to appear. These problems appear in terms of the attacks. There are number of attacks which are possible when data is being transmitted. One of the common attacks is DDOS. The DDOS attack will jam the traffic and will cause the deadlock in the system. The proposed system will first of all perform the encryption and then transmit the data forward. The data then will be compared against the database of extensions to determine any malicious activity. Key Words: Manet, Traffic, Ddos, Malicious, Extensions 1. INTRODUCTION MANET is the mobile Ad-hoc network which is self configuring system in which mobile devices are connected without wires. Each device which is present in the MANET is free to move in any direction. The traffic which is unrelated to the current node must be forwarded to the other nodes present on the network. These nodes may be connected to the organization or it may be connected over the internet. Internet will be used only if distance is larger. MANET has large number of sensors associated with it. The sensors will detect the path and direct the traffic from source to the destination. Data Monitoring and Mining is the common application of the MANET. The MANET is exposed to very huge and large number of users. The intension of the users may be uncertain. So MANET is prone to attacks. There could be large number of attacks which can take place over the MANET. Mainly there is one Common attack and that will be DDOS. DDOS(Distributed Daniel of Service Attack) will target a single system. The system is infected by the Trojen. The system will then transmit large number of packets towards the network. This will cause the network bandwidth to be used heavily. Hence the traffic will be jammed and deadlock will occur over the network. There exist necessary conditions for the deadlock. All the necessary conditions if satisfied simultaneously then deadlock over the network will occur. The necessary conditions will involve No Preemption, Hold and Wait, Circular Wait and Mutual Exclusion. All these conditions are satisfied through DDOS in order for the deadlock to occur within the system. When DDOS attack takes place then zombies are formulated. These zombies are the processes which does terminates however still remain in the memory. These zombies are removed if DDOS handling mechanisms are used. 2. VARIOUS TYPES OF ATTACKS The attacks on MANET are common all of these attacks are describe through the following table. Table -1: Name of the Table Various Attacks External As Well As Internal Passive attacks Active attacks Eaves- drop ping attacks, traffic analysis and monitoring Mac layer Net- Work layer Trans- port layer Appli- Cation layer Other attack Jam- ming Worm- hole, Black- hole, IP spoofing, Modifi cations Session Hijac- king,Syn Flooding Data Corru- ption DOS, DDOS Flood- ing, Gray Hole All of these attacks will corrupt the data present within the MANET nodes. So some sort of prevention mechanisms is
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 441 required. In the proposed system we will suggest a mechanism to overcome the DDOS attack. 3. EXISTING WORK Large amount of work is done in the area of MANET security. Some of the work which we have analyzed is in the area of Attacks that takes place in case of MANET. [1] Various routing protocols are considered in analyzed work. The rules and regulations are suggested which must be followed in order to ensure that data is transmitted correctly towards the destination. [2] the work is also being done in the area of determining the various attacks on the MANET. The prevention mechanism are also suggested in the existing work.[3] it is not easy to accomplish security within MANET. Security challenges and how we achieve security is suggested in the existing work. [4] the routing protocols are considered and their performance is compared with each other. Performance comparison will be done in the existing work. The performance comparison will be given in terms of a chart which is easy to understand. [5] the MANET in recent years has become popular. Lots of work has been done in this area. Routing strategies are considered in this case. This is one of the most difficult aspects of MANET. [6] due to vulnerabilities in the MANET, large number of security threats which are available. Security threats and solutions are suggested. Security mechanisms if followed successfully data can be secured. [7] Data will be exchanged between the nodes present within the MANET. Lack of infrastructure can cause deception. Trust is difficult to be established due to this problem.[8] there are number of routing protocols which are suggested. Routing is important concept which is discussed in this case. Various types of routing algorithms such as Hybrid , reactive and proactive routing algorithms are considered in the existing work. [9] Network Security mechanisms such as cryptography is also considered. The data which is transmitted first of all encrypted and then transferred. At the receiver ends the data is decrypted. There are very numbers of vulnerabilities that exist within the MANET because of which security threats are imposed. There identification is compulsory which is suggested in the analyzed work. In all the papers we have analyzed security threats and there solutions are suggested. But the concept of insider attack is not indicated. In the proposed scheme the restricted access protocol is suggested. This protocol will go to detect the intruder through questionnaires. 4. DATABASE OF EXTENSIONS The database is maintained which will contain information about all the extensions which are not understood by the receiving node. The extension which is malicious will cause DDOS attack. In order to prevent that the incoming packet extension will be compared against the database of extension(∑di). If match occurs then data will not be transferred forwarded. This will detect the attack. The procedure of encryption of data will be performed after the extensions have been checked correctly. Hence extra security feature is introduced in this case. If ∑di=∑pi then Malicious=1 Else Malicious=0 End of if 5. ENCRYPTION Encryption is the mechanism by which message is converted into the form which may not be understood by the hackers or malicious users. The encryption strategies are large in number. We will follow RSA technique for the encryption purpose. We have both public as well as private key encryption mechanism available to be used. In public key encryption source as well as destination both knows about the key. But in private key encryption key is hidden. In RSA algorithm both public as well as private keys are used for encoding and decoding purpose. The RSA algorithm will be as described below.  Two large numbers are chosen which are denoted as and  Determine  is the remainder or modulus for the public and the private keys  Determine quotient: .  Select a value which is of Integer such that 1 < < , and is co- prime to ie: and share no factors other than 1; gcd( , ) = 1.  is the public key exponent  Compute which satisfy the Relation ie: for some integer .  will represent the private key exponent. 6. RESTRICTED ACCESS PROTOCOL In this protocol features of Encryption and restricted extensions will be used. If the data is not malicious then its extension will not match with the database of extensions. Once approved the encryption process will be used to enhance the security mechanisms. The DDOS attack will be prevented since malicious data cannot be repeated and hence blocked by the use of above said protocol. The DDOS attack is shown through the diagram given below. The RAP is efficient in order to prevent this type of attack.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 442 Features of encryption as well as malicious extension checking are used in the proposed model. Pre-compromised computers Diagram -1: Ddos attack on a node 7. CONCLUSIONS The existing system uses the algorithms only to detect the attacks which are generated from outside. This means stress in given only to the external attacks. In the proposed system insider attack is handled with the help of RAP. The restricted access protocol will uses the Encryption as well as database of extension. It will contain the predefined answers from the users of the MANET. The given answers will be compared against the predefined answers. The experiment result indicates that the security is increased by 80% by the use of this protocol. REFERENCES [1] A. Shrivastava and A. Shanmogavel, “Overview of routing protocols in MANET’s and enhancements in reactive protocols,” … Comput. Sci. …, 2005. [2] J. G. Ponsam and R. Srinivasan, “A Survey on MANET Security Challenges,, Attacks and its Countermeasures,” Int. J. Emerg. Trends Technol. Comput. Sci., vol. 3, no. 1, pp. 274–279, 2014. [3] A. Dorri and S. R. Kamel, “Security Challenges in Mobile Ad Hoc Networks: A Survey,” Int. J. Comput. Sci. Eng. Surv., vol. 6, no. 1, pp. 15–29, 2015. [4] H. Paul and P. Das, “Performance Evaluation of MANET Routing Protocols,” Int. J. Comput. Sci. Issues, vol. 9, no. 4, pp. 449–456, 2012. [5] D. S. S. D. A. P. Dr.S.S.Dhenakaran, “An Overview of Routing Protocols in Mobile Ad-Hoc Network,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, no. 2, pp. 251 – 259, 2013. [6] W. Li and A. Joshi, “Security Issues in Mobile Ad Hoc Networks-A Survey,” Dep. Comput. Sci. Electr. …, pp. 1–23, 2008. [7] H. Zhao, “Security in Ad Hoc Networks,” Security, pp. 756–775, 2003. [8] H. Kaur, V. Sahni, and M. Bala, “A Survey of Reactive, Proactive and Hybrid Routing Protocols in MANET: A Review,” Network, vol. 4, no. 3, pp. 498–500, 2013. [9] T. Mamatha, “Network Security for MANETS,” no. 2, pp. 65–68, 2012. Attacker Target