ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Zombie Attack Analyser and Counter Measure In Cloud

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 7)

Publication Date:

Authors : ; ;

Page : 1048-1051

Keywords : network nodes; malicious conditions;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this field has focused primarily on denial of communication at the routing or medium access control levels. Exploring resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes battery power. These Zombie attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Zombie attacks are very and difficult to detect and are easy to carry out with the normal data. A single zombie attack increases the data size. We discuss the methods to detect and stop this kind of attack. For this We create a network showing how the data is transfer from source to destination and also monitors whether the given data is normal or the data is infected by zombie attack.

Last modified: 2021-06-30 21:50:52