Abstract
The DDoS attack is more vulnerable attack in the self structured and infra structure less MANET environment. The bot net based flooding attack is very cheap and easy to implement. Many detection and prevention mechanisms has been proposed to avoid DDoS attack. Here we have proposed the stochastic model of covariance matrix analysis in which the entropy difference has been computed by the frequency distribution of rule metrics against the threshold entropy periodically which in turn difference is highest can be controlled by reCAPTCHA controller to defend against DDoS attack. The prevention mechanism by trust evaluation using clustering methodology used to identify the attacker and reduce the cost of detection mechanism. The Aumann agreement theorem based trust re-evaluation is also proposed in order to reduce the false positive and negative probabilities, such that the accuracy of the system is enhanced. Finally the nodes identified as attacker by their trust values will be evicted and rekeying has been done. The experimental analysis in NS2 with CAIDA dataset shows true positive rate and detection rate is high in the proposed mechanism.
Similar content being viewed by others
References
Poongodi, M., Bose, S.: Design of intrusion detection and prevention system (IDPS) using DGSOTFC in collaborative protection networks. In: 2013 fifth international conference on advanced computing (ICoAC). IEEE, (2013)
Poongodi, M., Bose, S., Ganesh Kumar, N.: The effective intrusion detection system using optimal feature selection algorithm. Int. J. Enterp. Netw. Manag. (2015) http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijenm
Poongodi, M., Bose, S.: The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation. Adv. Nat. Appl. Sci. 9(6), 574–580 (2015)
Yin, M., Feng, J., Tang, Y.: An overview on node behavior trust evaluation in ad hoc network. Advances in Wireless Sensor Networks. Springer, Berlin (2013)
Cho, J.-H., Chen, I.-R.: Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks. Wirel. Netw. 16(4), 1157–1173 (2010)
Lang, R., Deng, Z.: Data distribution algorithm using time based weighted distributed hash tables. In: Proceedings of 7th international conference on grid and cooperative computing, pp. 210–213, 24–26 Oct 2008
Zhang, H., Goel, A., Govindan, R.: Improving lookup latency in distributed hash table systems using random sampling. IEEE/ACM Trans. Netw. 13(5), 1121–1134 (2005)
Xia, P., Wu, M., Wang, K., Chen, X.: Identity-based fully distributed certificate authority in an OLSR MANET’. 4th international conference on wireless communications, networking and mobile computing, 2008. WiCOM ’08, pp. 1–4, 12–14 Oct 2008
Thostle, J.: Applying network address encryption to anonymity and preventing data exfiltration. Military communications conference, MILCOM 2008. IEEE 2008, pp. 1–7 (2008)
Eissa, T., Razak, S.A., Ngadi, M.A.: Enhancing MANET security using secret public keys. In: International conference on future networks, pp. 130–134 (2009)
Qin, Y., Huang, D.: A statistical traffic pattern discovery system for MANETs. IEEE Trans. Depend. Sec. Comput. 11(2), 181–192 (2014)
Biswas, S., Dey, P.: Secure check pointing-recovery using trusted nodes in MANET. In: 4th international conference on computer and communication technology 2013, pp. 175–180
François, J., Aib, I., Boutaba, R.: FireCol: a collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Trans. Netw. (TON) 20(6), 1828–1841 (2012)
Luo, F., Khan, L., Bastani, F., Yen, I.L., Zhou, J.: A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles. Bioinformatics 20, 2605–2617 (2004)
Perkins, D.D.: Factors affecting the performance of ad hoc networks. In: IEEE international conference on communications, vol. 4, pp. 2048–2052 (2002)
Wei, Z., Tang, H., Yu, F.R., Wang, M., Mason, P.: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63, 4647–4658 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Poongodi, M., Bose, S. Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET. Cluster Comput 18, 1549–1559 (2015). https://doi.org/10.1007/s10586-015-0496-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-015-0496-y