A Mitigation Technique for DoS Attack in Wireless Network Based Gradient Matrix and Firefly

Jeewanjot Kaur, Taranjit Singh Aulakh


In computing, a denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source. In this research a generalized model for detection has been created by studying the existing models and algorithms on DoS attacks. Internet security is vital to facilitate e-commerce transactions, and there has been continued research effort to provision network traffic monitoring at high speeds. In the proposed technique a threshold is also defined so that any other node id which is greater than that threshold may be prevented. In case of any intrusion IP backtracking and packet logging is used to detect the intruder and mitigate it. From result it may be clear that the QoS parameters are improved using proposed approach and there are improved by approx 15-18% from the existing approach.

Full Text:



Hashizume, K.; Rosado, D.; Fernandez-Medina, E.; Fernandez, E. An analysis of security issues for cloud computing. J. Int. Serv. Appl. 2013.

Gonzalez, N.; Miers, C.; Redigolo, F.; Carvalho, T.; Simplicio, M.; de Sousa, G.; Pourzandi, M. A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. In Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), Athens, Greece, 29 November–1 December 2011; pp. 231–238.

KrebsonSecurity. DDoS on Dyn Impacts Twitter, Spotify, Reddit. Available online: https://krebsonsecurity. com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/ (accessed on 3 August 2017).

Khandelwal, Massive DDoS Attacks against Dyn DNS 2016. Available online: http://thehackernews.com/ 2016/10/dyn-dns-ddos.html (accessed on 3 August 2017).

Grobauer, B.; Walloschek, T.; Stocker, E. Understanding Cloud Computing Vulnerabilities. Secur. Priv. IEEE 2011, 9, 50–57.

Khorshed, M.T.; Ali, A.S.; Wasimi, S.A. A Survey on Gaps, Threat Remediation Challenges and Some Thoughts for Proactive Attack Detection in Cloud Computing. Future Gener. Comput. Syst. 2012, 28, 833–851.

Khalil, I.M.; Khreishah, A.; Azeem, M. Cloud computing security: A survey. Computers 2014, 3, 1–35.

Ali, M.; Khan, S.U.; Vasilakos, A.V. Security in cloud computing: Opportunities and challenges. Inf. Sci. 2015, 305, 357–383.

Masdari, M.; Jalali, M. A survey and taxonomy of DoS attacks in cloud computing. Secur. Commun. Netw. 2016, 9, 3724–3751; SCN-15-0746.R1.

Osanaiye, O.; Choo, K.K.R.; Dlodlo, M. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 2016, 67, 147–165

MalleshamDasari, “Real Time Detection of MAC Layer DoS Attacks in IEEE 802.11 Wireless Networks”, 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2017

Adrien Bonguet and Martine Bellaiche, "A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing" www.mdpi.com/journal/futureinternet vol 9, Aug 2017


  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.