Detection of Malicious nodes inVanet
Vehicular Ad hoc
Network provides vehicle to vehicle and vehicle to roadside communication by a
self-configuration type of network. Through the nodes the data is shared
representing themselves as servers and clients across the network. Computers,
communications, management technologies, sensor and control innovations
comprises of several components. For integration of these functions there can
be an improvement in the functioning of a transportation system. By using Vehicular
Ad-Hoc Networks the warnings related to the environmental hazards, traffic,
road conditions and data regarding the transmission amongst vehicles is
provided. The information can be spread across the network if there is any kind
of traffic jam or road closure. This
saves time and also helps the drivers for avoiding the specific routes.
Distributed
Denial of Service Attack (DDOS) attack is an attempt made by an attacker from
different location for stopping the legitimate users from the system for accessing
the required objects. Examples of the DDOS attack are as follows:
i) Flooding the network prevents access of legitimate network traffic.
ii) Disruption of the connections amongst two machines prevents users to access service.
iii) Through preventing one individual user to have access to it prevents the user from accessing a service.
i) Flooding the network prevents access of legitimate network traffic.
ii) Disruption of the connections amongst two machines prevents users to access service.
iii) Through preventing one individual user to have access to it prevents the user from accessing a service.
Within the DDOS attacks there are different tools
utilized. Even though they have different name they have same basic structure
of the tools. Following are the components as shown in figure .
· Attacker: If the hacker uses the personal computer it is the responsibility of the hacker.
· Master: the system receives direct command from the attacker also the other agents are controlled by it.
· Handler: through this program the tasks are performed on the program master system.
· Agent: the system directly attack the target
· Demon program: with the help of this program the above tasks are performed on the agent system.
· Attacker: If the hacker uses the personal computer it is the responsibility of the hacker.
· Master: the system receives direct command from the attacker also the other agents are controlled by it.
· Handler: through this program the tasks are performed on the program master system.
· Agent: the system directly attack the target
· Demon program: with the help of this program the above tasks are performed on the agent system.
Garima
Saini
Assistant
Professor
Department
of Information Technology.