Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/56599
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Varadharajan, Vijay | en |
dc.contributor.author | Tupakula, Udaya | en |
dc.date.accessioned | 2023-11-15T08:24:23Z | - |
dc.date.available | 2023-11-15T08:24:23Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Concurrency and Computation: Practice and Experience, 27(15), p. 3794-3815 | en |
dc.identifier.issn | 1532-0634 | en |
dc.identifier.issn | 1532-0626 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/56599 | - |
dc.description.abstract | <p>The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. The term mobile botnet refers to group of mobile devices that are compromised and controlled by the attacker that can be used for generating distributed denial-of-service attacks. The security protocols that have been proposed for wireless and mobile networks have several weaknesses that can be exploited by the attacker to obtain unauthorized access and generate attacks. Also, there is growing number of malicious applications that are aimed to compromise smartphones and using them for generating different types of attacks. In this paper, we propose techniques to counteract distributed denial-of-service attacks on wireless mobile devices. We describe the operation and architectural components of our model. We will show that our model is able to efficiently deal with the attacks by dropping the attack traffic before it targets the victim mobile node, can prevent the attack traffic at the upstream nodes, and also deal with the attack cases that involve mobility of the attacking and victim nodes.</p> | en |
dc.language | en | en |
dc.publisher | John Wiley & Sons Ltd. | en |
dc.relation.ispartof | Concurrency and Computation: Practice and Experience | en |
dc.title | Securing wireless mobile nodes from distributed denial-of-service attacks | en |
dc.type | Journal Article | en |
dc.identifier.doi | 10.1002/cpe.3353 | en |
local.contributor.firstname | Vijay | en |
local.contributor.firstname | Udaya | en |
local.profile.school | School of Science & Technology | en |
local.profile.email | utupakul@une.edu.au | en |
local.output.category | C1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | United Kingdom | en |
local.format.startpage | 3794 | en |
local.format.endpage | 3815 | en |
local.peerreviewed | Yes | en |
local.identifier.volume | 27 | en |
local.identifier.issue | 15 | en |
local.contributor.lastname | Varadharajan | en |
local.contributor.lastname | Tupakula | en |
dc.identifier.staff | une-id:utupakul | en |
local.profile.orcid | 0000-0001-5048-9797 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/56599 | en |
local.date.onlineversion | 2014-08-29 | - |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Securing wireless mobile nodes from distributed denial-of-service attacks | en |
local.output.categorydescription | C1 Refereed Article in a Scholarly Journal | en |
local.search.author | Varadharajan, Vijay | en |
local.search.author | Tupakula, Udaya | en |
local.open.fileurl | https://rune.une.edu.au/web/retrieve/a079f85d-d2b7-471c-9250-d45711107eac | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.available | 2014 | en |
local.year.published | 2015 | en |
local.fileurl.open | https://rune.une.edu.au/web/retrieve/a079f85d-d2b7-471c-9250-d45711107eac | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/a079f85d-d2b7-471c-9250-d45711107eac | en |
local.subject.for2020 | 460407 System and network security | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.date.moved | 2024-04-16 | en |
Appears in Collections: | Journal Article School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
SCOPUSTM
Citations
2
checked on Feb 15, 2025
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.