Zombie Attack Analyser and Counter Measure In Cloud
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 7)Publication Date: 2015-07-05
Authors : Lokesh A. Kochekar; S. P. Washimkar;
Page : 1048-1051
Keywords : network nodes; malicious conditions;
Abstract
Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this field has focused primarily on denial of communication at the routing or medium access control levels. Exploring resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. These Zombie attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Zombie attacks are very and difficult to detect and are easy to carry out with the normal data. A single zombie attack increases the data size. We discuss the methods to detect and stop this kind of attack. For this We create a network showing how the data is transfer from source to destination and also monitors whether the given data is normal or the data is infected by zombie attack.
Other Latest Articles
Last modified: 2021-06-30 21:50:52