ABSTRACT
This study detail show that the routing path for the wireless network, and explain how to fast and efficient choosing the correct path. In addition, DoS attack has become the serious problem in the network security. Therefore, this study using the NS2 to simulate the DoS attacks. Finally we compare the variety of Queue for the tolerance of the attacks.
- Zhuang Xiao-yan, wireless network security solutions-802.1x implementations in the authenticator and improvement, National Taiwan University Institute of Information Engineering Master's thesisGoogle Scholar
- Ke Zhi Heng, Cheng Rongxiang, Kun Xie, Wen-Xiang Huang, computer network experiment - NS2 simulation tool to implement, learn Guan 2005Google Scholar
- Ke Zhi Heng, "NS2 manual http://140.116.72.80/~smallko/ns2/ns2.htm"Google Scholar
- Ma Shuzhen to network traffic data mining to assist in denial of service attack detection and defense research Department of Information Management Master's thesis, National Sun Yat-senGoogle Scholar
- Qi-lun, mobile networks under random routing attack defense mechanisms to resist, National Tsing Hua University Institute for Information Systems and Application Master's thesisGoogle Scholar
- Lo Chun-Lin, The study and simulation on VoIP Availability, Chinese Culture University, Digital Electrical Technology Institute Master's thesisGoogle Scholar
Index Terms
- The study of the wireless network DoS attack
Recommendations
IEEE 802.11 DoS attack detection and mitigation utilizing Cross Layer Design
Denial of Service (DoS) attack is a powerful attack that disrupts the network and deprives the legitimate users from utilizing the network resources. DoS attacks could be implemented to target any layer of the Open Systems Interconnection (OSI) layers, ...
Survey of network-based defense mechanisms countering the DoS and DDoS problems
This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of service ...
A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesWireless networks provide an easier way of communication to its users. Network without infrastructure are more flexible in deployment. Ad hoc networks are such networks that do not require a planned infrastructure during its establishment. Network with ...
Comments