An enhanced port hiding design to handle DoS attacks in an ad-hoc environment

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In environments like virtual classrooms and defence areas, an ad-hoc cloud is increasingly being deployed. Ad-hoc cloud is prone to Denial of Service (DoS) attacks caused by addition of illegitimate clients to the cloud and busty requests from a single or multi-client. In this paper a client transparent approach is proposed using enhanced port hiding technique to mitigate these attacks and attain high performance in the ad-hoc cloud. Admission control is performed to bring control on the number of clients joining the ad-hoc cloud. A fair service to all requests of clients is achieved by a combined scheduling and congestion control mechanism for which wireless Greedy Primal Dual Algorithm (wGPD) is deployed and the algorithm achieves a greater hit ratio of 85 percent. A modified RTS/CTS technique suiting ad-hoc environment is also discussed to handle the hidden and exposed terminal problems. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Padmanabhan, J., Sukumar, A., Elumalai, E., & Ramesh, S. (2011). An enhanced port hiding design to handle DoS attacks in an ad-hoc environment. In Communications in Computer and Information Science (Vol. 190 CCIS, pp. 1–10). https://doi.org/10.1007/978-3-642-22709-7_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free