scholarly journals A Survey on DoS Attacks and Detection Schemes in Wireless Mesh Networks

2012 ◽  
Vol 38 ◽  
pp. 2329-2336 ◽  
Author(s):  
Sanam E. Anto ◽  
S. Seetha ◽  
Robin K. Kuriakose
Information ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 544
Author(s):  
Vinicius da Silva Faria ◽  
Jéssica Alcântara Gonçalves ◽  
Camilla Alves Mariano da Silva ◽  
Gabriele de Brito Vieira ◽  
Dalbert Matos Mascarenhas

Denial of service (DoS) attacks play a significant role in contemporary cyberspace scenarios. A variety of different DoS attacks pollute networks by exploring various vulnerabilities. A group of DoS called application DoS attacks explore application vulnerabilities. This work presents a tool that detects and blocks an application DoS called Slowloris on wireless mesh networks (WMNs). Our tool, called SDToW, is designed to effectively use the structure of the WMNs to block the Slowloris attack. SDToW uses three different modules to detect and block the attack. Each module has its specific tasks and thus optimizes the overall detection and block efficiency. Our solution blocks the attacker on its first WMN hop, reducing the malicious traffic on the network and avoiding further attacks from the blocked user. The comparison results show that SDToW performs with 66.7% less processing consumption and 89.1% less memory consumption than Snort. Our solution does not limit the number of parallel connections per user. Hence, by avoiding this limitation, SDToW has a lower incidence of false positive errors than Snort.


2018 ◽  
Vol 6 (1) ◽  
pp. 238-243
Author(s):  
Pushpender Sarao ◽  
◽  
T. Raghavendra Gupta ◽  
S. Suresh ◽  
◽  
...  

2010 ◽  
Vol 21 (6) ◽  
pp. 1404-1415
Author(s):  
Wei-Qi HU ◽  
Shi-Hong ZOU ◽  
Shi-Duan CHENG ◽  
Bo HU ◽  
Wen-Dong WANG

2009 ◽  
Vol 20 (6) ◽  
pp. 1539-1552 ◽  
Author(s):  
Chao DONG ◽  
Gui-Hai CHEN ◽  
Hai WANG

Sign in / Sign up

Export Citation Format

Share Document