Towards DoS attack prevention based on clustering architecture in mobile IP communication
|dc.contributor.author||Hussain, Farookh Khadeer|
|dc.contributor.editor||Adriano Carvalho and Carlos Couto|
|dc.identifier.citation||Parvin, Sazia and Sohrab, Ali and Singh, Jaipal and Hussain, Farookh Khadeer and Han, Song. 2009. Towards DoS attack prevention based on clustering architecture in mobile IP communication, in Adriano Carvalho and Carlos Couto (ed), 35th Annual Conference of IEEE Industrial Electronics (IECON), Nov 3 2009, pp. 3183-3188. Porto, Portugal: IEEE Industrial Electronics Society.|
Mobile IP communication, like wired communication and mobile ad hoc networking, is vulnerable to Denial-of-Service (DoS) attacks. In this paper, we propose using a lightweight packet filtering technique in different domains and base stations to reduce/eliminate the threat of DoS attacks on mobile IP networks. The proposed technique will be able to detect and filter out any suspected packets containing spoofed IP address created by DoS attackers. The results of our experiments indicate that our proposed technique can significantly reduce the effect of DoS attacks and improves performance of mobile IP communication.
|dc.publisher||IEEE Industrial Electronics Society|
|dc.title||Towards DoS attack prevention based on clustering architecture in mobile IP communication|
|dcterms.source.title||Proceedings of the 35th annual conference of IEEE industrial electronics (IECON)|
|dcterms.source.series||Proceedings of the 35th annual conference of IEEE industrial electronics (IECON)|
|dcterms.source.conference||35th Annual Conference of IEEE Industrial Electronics (IECON)|
|dcterms.source.conference-start-date||Nov 3 2009|
Copyright © 2009 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Digital Ecosystems and Business Intelligence Institute (DEBII)|
|curtin.faculty||Curtin Business School|
|curtin.faculty||The Digital Ecosystems and Business Intelligence Institute (DEBII)|