International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 9 , Issue 1 , PP: 61-65, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network

M. Gautham 1 , D. Chitra 2 * , B. Samitha 3

  • 1 Assistant Professor, Department of ECE, Mahendra Engineering College, Namakkal, Tamil Nadu, India - (gauthamm@mahendra.info)
  • 2 Professor, Department of ECE, Mahendra Engineering College, Namakkal, Tamil Nadu, India - (chitravalli2000@gmail.com)
  • 3 PG Scholar, Department of ECE, Mahendra Engineering College, Namakkal, Tamil Nadu, India - ()
  • Doi: https://doi.org/10.54216/IJWAC.090105

    Received: October 22, 2024 Revised: December 24, 2024 Accepted: January 21, 2025
    Abstract

    A novel honey pot deception trace back model, or honey pot IDS, is offered. The system is located on the server, which is the site of network intrusion deceptions. From there, it keeps an eye on all incoming traffic and uses nodes that carry out network weight age studies to continuously weigh the data. For every client connected to the server, it serves as a construct to look at the packet analysis and transmission path to which the IP processed the intrusion detection system. This LF-IDS detects intrusions using both anomaly-based and rule-based intrusion detection methods. By gathering and examining the packets from incoming traffic, the system initially collects data on the packet agent monitoring system. The trespasser is led to a honey pot that will be constructed as a mitigation site.

    Keywords :

    MANET , LF-IDS , Link Flooding , Cluster head

    References

    [1] Mousami Vanjale, Chitode, J. S. & Shilpa Gaikwad, ‘Residual Battery Capacity Based Routing Protocol for Extending Lifetime of Mobile Ad Hoc Network’, 2018 International Conference On Advances in Communication and Computing Technology (ICACCT), pp.445-450.

    [2] Muhammad Khalid Riaz, Fan Yangy and Imran Akhtar 2019, ‘Energy Aware Path Selection based Efficient AODV for MANETs’, Proceedings of 2019 16th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, pp.1040-1045.

    [3] Nan Kang, Elhadi M. Shakshuki & Tarek R. Sheltami 2011, ‘Detecting Forged Acknowledgements in MANETs’, IEEE International Conference on Advanced Information Networking and Applications, pp. 488 – 494.

    [4] Nidal Nasser & Yunfeng Chen 2007, ‘Enhanced Intrusion Detection Systems For Discovering Malicious Nodes in Mobile Ad Hoc Network’, In Proceedings of IEEE International Conference On Communication, Glasgow, Scotland, pp1155-1159.

    [5] Onashoga, SA, Akinde, AD & Sodiya, AS 2006, ‘A strategic review of existing mobile agent-based intrusion detection systems’, Issues in Informing Science & Information Technology, vol.6, pp.669–682.

    [6] Parth Patel, Rajesh Bansode & Bhushan Nemade 2016, ‘Performance Evaluation of MANET Network Parameters Using AODV Protocol for HEAACK Enhancement’, Elsevier Journals- Procedia Computer Science, vol.79, pp. 932-939.

    [7] N. Sugirtham, R. Sherine Jenny, B. Thiyaneswaran, et al., (2024), “Modified Playfair for Text File Encryption and Meticulous Decryption with Arbitrary Fillers by Septenary Quadrate Pattern” International Journal of Networked and Distributed Computing, pp. 1-11, https://doi.org/10.1007/s44227-023-00019-4.

    [8] K. Saravanan, S. Anthoniraj, S. Kumarganesh, T. Senthil Kumar, Martin Sagayam. K “Power Adjustment Algorithm for Higher Throughput in Mobile Ad hoc Networks” International Conference of Computer Sciences and Renewable Energies 2021 (ICCSRE 2021), July 23- 24, at Agadir, Morocco. https://doi.org/10.1051/e3sconf/202129701064

    [9] K. Saravanan, S. Anthoniraj, S. Kumarganesh, T.Senthil Kumar, Martin Sagayam. K “WMLP: Web-based Multi-Layer protocols for Emergency Data Transmission in Mobile Ad Hoc Network” International Conference of Computer Sciences and Renewable Energies 2021 (ICCSRE2021),July 23-24, at Agadir, Morocco. https://doi.org/10.1051/e3sconf/202129701065.

    [10] Lalitha, S.P, Murugan, A. “Workflow scheduling and optimization using evaluationary method and deep learning algorithm in cloud” Multimedia Tools and Applications, 2024; Vol.83, pp. 78879–78896. https://doi.org/10.1007/s11042-024-18556-7

    [11] Lalitha, S.P, Murugan, A. “Performance Analysis of Priority Generation System for Multimedia Video using ANFIS Classifier” International Journal of Computational and Experimental Science and Engineering, 2024; Vol.10(4), pp. 1320-1328. https://doi.org/10.22399/ijcesen.707.

    [12] S. Kumarganesh, S. Anthoniraj, T.Senthil Kumar, P.Elayaraja, et al. (2022), “A Novel Analytical Framework is Developed for Wireless Heterogeneous Networks for Video Streaming Applications” Journal of Mathematics, 2022(1) pp.1-7 doi:https://doi.org/10.1155/2022/2100883.

    [13] K. Baskar, K. Muthumanickam, P. Vijayalakshmi & S. Kumarganesh, (2024), “A Strong Password Manager Using Multiple Encryption Techniques”. Journal of The Institution of Engineers (India): Series B, pp. 1-8, DOI: https://doi.org/10.1007/s40031-024-01144-6.

    Cite This Article As :
    Gautham, M.. , Chitra, D.. , Samitha, B.. Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2025, pp. 61-65. DOI: https://doi.org/10.54216/IJWAC.090105
    Gautham, M. Chitra, D. Samitha, B. (2025). Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network. International Journal of Wireless and Ad Hoc Communication, (), 61-65. DOI: https://doi.org/10.54216/IJWAC.090105
    Gautham, M.. Chitra, D.. Samitha, B.. Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network. International Journal of Wireless and Ad Hoc Communication , no. (2025): 61-65. DOI: https://doi.org/10.54216/IJWAC.090105
    Gautham, M. , Chitra, D. , Samitha, B. (2025) . Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network. International Journal of Wireless and Ad Hoc Communication , () , 61-65 . DOI: https://doi.org/10.54216/IJWAC.090105
    Gautham M. , Chitra D. , Samitha B. [2025]. Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network. International Journal of Wireless and Ad Hoc Communication. (): 61-65. DOI: https://doi.org/10.54216/IJWAC.090105
    Gautham, M. Chitra, D. Samitha, B. "Efficacious Framework for The Detection of Link Flooding Attack in Mobile Ad Hoc Network," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 61-65, 2025. DOI: https://doi.org/10.54216/IJWAC.090105