Tuesday 8 October 2019

Detection of Malicious nodes inVanet



Detection of Malicious nodes inVanet

Vehicular Ad hoc Network provides vehicle to vehicle and vehicle to roadside communication by a self-configuration type of network. Through the nodes the data is shared representing themselves as servers and clients across the network. Computers, communications, management technologies, sensor and control innovations comprises of several components. For integration of these functions there can be an improvement in the functioning of a transportation system. By using Vehicular Ad-Hoc Networks the warnings related to the environmental hazards, traffic, road conditions and data regarding the transmission amongst vehicles is provided. The information can be spread across the network if there is any kind of traffic jam or road closure.  This saves time and also helps the drivers for avoiding the specific routes.
Distributed Denial of Service Attack (DDOS) attack is an attempt made by an attacker from different location for stopping the legitimate users from the system for accessing the required objects. Examples of the DDOS attack are as follows:
i)            Flooding the network prevents access of legitimate network traffic.
ii)      Disruption of the connections amongst two machines prevents users to access service.
iii)    Through preventing one individual user to have access to it prevents the user from    accessing a service.
Within the DDOS attacks there are different tools utilized. Even though they have different name they have same basic structure of the tools. Following are the components as shown in figure .
·      Attacker: If the hacker uses the personal computer it is the responsibility of the hacker.
·     Master: the system receives direct command from the attacker also the other agents are controlled by it.
·     Handler: through this program the tasks are performed on the program master system.
·     Agent: the system directly attack the target
·  Demon program: with the help of this program the above tasks are performed on the agent system.

Garima Saini
Assistant Professor
Department of Information Technology.


8 comments:


  1. Click here Happy New Year Offers grab Opportunity with 25% Off ALL Products

    Order Now>> Buy Online Medicine free Shipping in US TO US 3 To 4 days Delivery

    Buy Tramadol Online
    Buy Xanax Online
    Buy Ambien Online
    Buy hydrocodone online
    Buy Adderall Online
    Buy Phentermine Online
    Buy Valium Online

    ReplyDelete