How to cite this paper
Mughaid, A., Obaidat, I., Aljammal, A., AlZu’bi, S., Quiam, F., Laila, D., Al-zou’bi, A & Abualigah, L. (2023). Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution.International Journal of Data and Network Science, 7(2), 757-764.
Refrences
Aad, I., Hubaux, J. P., & Knightly, E. W. (2008). Impact of denial of service attacks on ad hoc networks. IEEE/ACM transactions on networking, 16(4), 791-802.
Anjum, S. S., Noor, R. M., & Anisi, M. H. (2017). Review on MANET based communication for search and rescue opera-tions. Wireless personal communications, 94(1), 31-52.
Arunmozhi, S. A., & Venkataramani, Y. (2011). Ddos attack and defense scheme in wireless ad hoc networks. arXiv pre-print arXiv:1106.1287.
Cai, J., Yi, P., Chen, J., Wang, Z., & Liu, N. (2010, April). An adaptive approach to detecting black and gray hole attacks in ad hoc network. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 775-780). IEEE.
Fratta, L., Gerla, M., & Lim, K. W. (2018). Emerging trends and applications in ad hoc networks. Annals of Telecommuni-cations, 73, 547-548.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, September). Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 30-40).
Jahir, Y., Atiquzzaman, M., Refai, H., Paranjothi, A., & LoPresti, P. G. (2019). Routing protocols and architecture for dis-aster area network: A survey. Ad Hoc Networks, 82, 1-14.
Marashdeh, Z., Suwais, K., & Alia, M. (2021, July). A survey on sql injection attack: Detection and challenges. In 2021 International Conference on Information Technology (ICIT) (pp. 957-962). IEEE.
Mughaid, A., Al-Zu’bi, S., Al Arjan, A., Al-Amrat, R., Alajmi, R., Zitar, R. A., & Abualigah, L. (2022a). An intelligent cybersecurity system for detecting fake news in social media websites. Soft Computing, 26(12), 5577-5591.
Mughaid, A., AlZu’bi, S., Alnajjar, A., AbuElsoud, E., Salhi, S. E., Igried, B., & Abualigah, L. (2022b). Improved drop-ping attacks detecting system in 5g networks using machine learning and deep learning approaches. Multimedia Tools and Applications, 1-23.
Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., & Elsoud, E. A. (2022c). An intelligent cyber security phishing detection system using deep learning techniques. Cluster Computing, 25(6), 3819-3828.
Reddy, K. G., & Thilagam, P. S. (2020). Naïve Bayes classifier to mitigate the DDoS attacks severity in ad-hoc networks. International Journal of Communication Networks and Information Security, 12(2), 221-226.
Saini, T. K., & Sharma, S. C. (2019). Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classi-fication, and key attributes. Ad Hoc Networks, 89, 58-77.
Usha, R., Premananda, B. S., & Reddy, K. V. (2017, June). Performance analysis of MANET routing protocols for military applications. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 1063-1068). IEEE.
Wei, W., Song, H., Wang, H., & Fan, X. (2017). Research and simulation of queue management algorithms in ad hoc net-works under DDoS attack. Ieee Access, 5, 27810-27817.
Anjum, S. S., Noor, R. M., & Anisi, M. H. (2017). Review on MANET based communication for search and rescue opera-tions. Wireless personal communications, 94(1), 31-52.
Arunmozhi, S. A., & Venkataramani, Y. (2011). Ddos attack and defense scheme in wireless ad hoc networks. arXiv pre-print arXiv:1106.1287.
Cai, J., Yi, P., Chen, J., Wang, Z., & Liu, N. (2010, April). An adaptive approach to detecting black and gray hole attacks in ad hoc network. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 775-780). IEEE.
Fratta, L., Gerla, M., & Lim, K. W. (2018). Emerging trends and applications in ad hoc networks. Annals of Telecommuni-cations, 73, 547-548.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, September). Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 30-40).
Jahir, Y., Atiquzzaman, M., Refai, H., Paranjothi, A., & LoPresti, P. G. (2019). Routing protocols and architecture for dis-aster area network: A survey. Ad Hoc Networks, 82, 1-14.
Marashdeh, Z., Suwais, K., & Alia, M. (2021, July). A survey on sql injection attack: Detection and challenges. In 2021 International Conference on Information Technology (ICIT) (pp. 957-962). IEEE.
Mughaid, A., Al-Zu’bi, S., Al Arjan, A., Al-Amrat, R., Alajmi, R., Zitar, R. A., & Abualigah, L. (2022a). An intelligent cybersecurity system for detecting fake news in social media websites. Soft Computing, 26(12), 5577-5591.
Mughaid, A., AlZu’bi, S., Alnajjar, A., AbuElsoud, E., Salhi, S. E., Igried, B., & Abualigah, L. (2022b). Improved drop-ping attacks detecting system in 5g networks using machine learning and deep learning approaches. Multimedia Tools and Applications, 1-23.
Mughaid, A., AlZu’bi, S., Hnaif, A., Taamneh, S., Alnajjar, A., & Elsoud, E. A. (2022c). An intelligent cyber security phishing detection system using deep learning techniques. Cluster Computing, 25(6), 3819-3828.
Reddy, K. G., & Thilagam, P. S. (2020). Naïve Bayes classifier to mitigate the DDoS attacks severity in ad-hoc networks. International Journal of Communication Networks and Information Security, 12(2), 221-226.
Saini, T. K., & Sharma, S. C. (2019). Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classi-fication, and key attributes. Ad Hoc Networks, 89, 58-77.
Usha, R., Premananda, B. S., & Reddy, K. V. (2017, June). Performance analysis of MANET routing protocols for military applications. In 2017 International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 1063-1068). IEEE.
Wei, W., Song, H., Wang, H., & Fan, X. (2017). Research and simulation of queue management algorithms in ad hoc net-works under DDoS attack. Ieee Access, 5, 27810-27817.