Adhoc network have a features of their less infrastructure network consisting of mobile terminal with the capability to communicate with each other nodes. Due to less infrastructure any mobile terminal can attach and leave the network. Mobile nodes can attach each other nodes through automatically configuration. So this feature make mobile Ad hoc network powerful and flexible when mobile nodes of Ad hoc network try to transfer the data. Then various security flaws and attacks have created to interrupt the services of Ad hoc Network. which makes the Ad hoc network vulnerable. DDoS attacks are more powerful attack in Ad hoc network as compare to other attacks. In this work we purposed a effective approach to detect and identify the DDoS attacks class, consequences and perquisites. We use Ontology based approach to developed the ontology of DDoS attacks .We detect the security flaws, weakness ,vulnerability and other various attacks of DDoS attacks in Ad Hoc. By using the Ontology based approach the first goal of this work is to developed the DDoS attacks Ontology and their consequences ,perquisites, impacts and attacks in logical way . Then we utilized Jena Framework to detected and read the DDoS attacks classes from DDoS RDF and knowledge base and then we can extract the logical and reasonable results from DDoS attacks knowledge base .In this work we used DDoS attacks domain purposed Ontology is generated the well known Taxonomy CAPEC,CVE CWE .ISS-X-Force and OSVDB data sets. This purposed work is used to read the DDoS attacks but also detect and defined the DDoS attack Classes in Ad hoc.
K.higgins, R.Egan, S.Hurley, M. Lemur, “Ad Hoc Networks”, Technological Survey, 2005.
Gray Breed, “Wireless Ad Hoc networks: Basic Concepts,” High Frequency Electronics, Summit Technical Media, LLC, vol 12, no 4, pp 30-36, 2007.
Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani, “Intrusion Detection for Wormhole Attacks in Ad hoc Networks a Survey and a Proposed Decentralized Scheme,” Proc. of Third International Conference on Availability, Reliability and Security, vol 13, issue 2, pp 50-55, 2006.
A.Lavanya, K.Saravanan, “A Review of DDoS Attacks In Mobile Ad-hoc Networks,” Proc. of International Journal of Societal Applications of Computer Science, vol 1, Issue 1, pp 22-28, November 2012.
Daljeet Kaur, Monika Sachdeva, Krishan, “Study of DDoS attacks using DETER Testbed,” Proc. of International Journal of Computing and Business Research (IJCBR) ISSN (Onlinev) vol 3, Issue no. 2, May 2012.
Jelena Mirkovic and Peter Reiher “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” Proc. of ACM SIGCOMM Computer Communication Review, vol 34, no 2, pp 39-53, 2004.
Ahmad Salahi , Morteza Ansarinia, “ Predicting Network Attacks Using Ontology-Driven Inference,” Elesver Computer Networks, vol 47, no 4, pp 445-487, 2005.
Amina Souag, Camille Salinesi, Isabelle Wattiau, “Ontologies for Security Requirements: A Literature Survey and Classification,” Proc. of Journal on Advanced Information Systems, vol 112, pp 61-69, 2012.
Ju An Wang and Minzhe Guo, “OVM: An Ontology for Vulnerability Management,” Proc. of 5th Annual Workshop on Cyber Security and Information Intelligence Research, pp 1-4, 2009.
John Pinkston, Jeffrey Undercoffer, Anupam Joshi and Timothy Finin, “A Target-Centric Ontology for Intrusion,” Proc. of 18th International Joint Conference on Artificial Intelligence, pp 9-15, 2004.
Andrew Simmonds, Peter Sandilands, Louis van Ekert, “An Ontology for Network Security Attacks,” Proc. of Applied Computing, Springer Berlin Heidelberg, vol 3285, pp 317-323, 2004.
Adhoc, DDos, Protégé, Ontology.