Academia.eduAcademia.edu
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 6, 2020 Distributed Denial of Service Attacks in Cloud Computing Hesham Abusaimeh Associate Professor in Computer Science Middle East University, Amman, 11831 Jordan Abstract—The Cloud Computing attacks have been increased since the expanded use of the cloud computing. One of the famous attacks that targets the cloud computing is the distributed denial of service (DDoS) attack. The common features and component of the cloud structure make it more reachable from this kind of attack. The DDOS is targeting the large number of devices connected in any cloud service provider based on its scalability and reliability features that make the cloud available from anywhere and anytime. This attack mainly generate a large number of malicious packets to make the targeted server busy dealing with these huge number of packets. There many techniques to defend the DDOS attack in the regular networks, while in the cloud computing this task is more complicated regarding the various characteristics of the cloud that make the defending process not an easy task. This paper will investigate most of the method used in detecting and preventing and then recover from the DDoS in the cloud computing environment. Keywords—Cloud; cloud computing; DoS attacks; DDoS attacks; DDoS prevention; DDoS mitigation I. INTRODUCTION Cloud computing features include availability at any time, network access, resource pooling, flexibility, and measured service. Availability means that cloud users can access and can manage their computing resources anytime, anywhere. Pooled resources mean Cloud users can use them from a range of computing resources if they need more resources to add to their existing cloud. Flexibility means that services can increase in size more or less. Moreover, the cloud user will only pay for their cloud resources. Cybersecurity researchers are considering the attacks performed on the cloud as these attacks affect the budget, resource management, and quality of service they are providing. We provide a comprehensive classification of solutions to classify DDoS attack solutions, and to provide a comprehensive discussion of important measures to evaluate different solutions. Many companies have adopted cloud computing due to its various features like on-demand service, wide network access, resource pooling, fast flexibility, and measured services. These features allow companies to look after their business operations, while the Cloud Service Provider (CSP) is managing the computing resources. Cloud model contoured to reduce business costs by making the installation of hardware and software updates and ensuring computing resources at the cloud service providers' side. This paper is looking to provide information about DDoS attacks over the cloud environment. We also will try to distinguish between the types of various DDoS attacks, exploring and classifying the various contributions in this field. For this purpose, we prepared a detailed classification of these studies to assist to understand this survey. A. DOS vs DDoS Attacks When developing services on the cloud, safety must be taken into account critically. Some of the aspects that pose a challenge for cloud computing are: Identity Authentication Authorization Integrity Isolation Availability Confidentiality In a DDoS attack, hosts, such as robots or zombies, maybe a virtual machine, PC, or laptop. They have a remote-control feature. The use of a large number of hosts in an attack is called DDoS. More annoying DDoS than DoS. A group, hundreds of thousands of robots known as a botnet. The DDoS attack targets connection bandwidth and resources such as buffers, network protocols, or application processing logic. II. BACKGROUND In this section, we will try to highlight the purpose or motivations behind some of the common DDoS attacks. However, many different categories can be identified to characterize the motivations behind DDoS attacks; the following is a summary of the purpose or motivations behind DDoS attacks. • Financial or criminal benefit: This is classified as a motivation, and considers the most dangerous attack as the attackers try to get financial benefit by performing their attacks. • Revenge: This type is classified as a motivation, as some frustrated individuals perform some of the attacks as payment of some injustice perceived. • Ideological belief: Attackers performing this attack are motivated by their ideological beliefs. • Intellectual challenge: Attackers perform DDoS attacks as a way to show off the capabilities and what they can harm as self-arrogant. • Cyberwarfare: some well-trained military people or some of what is called terrorist individuals or organizations make this type of attack. 163 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 6, 2020 • Script Kiddies: New enthusiastic attackers who are trying some of the new tools on the Internet. They could use a bot-master that manages a network of bots or becomes part of Botnet that is involved in the attack. • Hacktivists: They are recruited through social networking sites. They fight for the cause gives them a sense of purpose. • Labor issue: The competitors may play a dirty game. You can launch DDoS attacks easily to the point of stop web services for competitors, by making use of the services of the attack Botnet provider. Botnet provider has fields to fill the target, and then a single click can be thousands of nodes begin to flood server’s competition. • Thrill attacks: Where the attacker so only to feel a sense of pride in this achievement. Extortion or Ransom: Criminals who are willing to do anything malicious in exchange for money [1]. III. TYPES OF DDOS ATTACKS In this section, an analysis of the basic functioning of the DDoS attacks will be covered, and list the main types of DDoS attacks and provide a brief description of each type of attacks as the following. • Direct Flood Attacks: Indirect flood attacks, an attack transfers a single package directly from its computer to the victim's site. It is the simplest type of DDoS attack. • Remote Controlled Network Attacks: In these attacks instead of individual attackers like direct flood attacks, an attacker breaches a series of computers and places an application or proxy on computers. • Flooding Attacks: These attacks generate the source of the IP packet source address with the victim's IP address and send it to an intermediate host whenever there is a response from the intermediate host; it is sent to the victim's destination address, and the victim is dumped [2]. • Worms: We can distinguish between a worm and a virus in the fact that the virus needs human intervention to inject a computer that the worm does not need. Worms can greatly disrupt the normal operation of the Internet. • Viruses: Viruses have had a major impact on network providers. To structure a large zombie network, viruses are oftentimes used. In 1983 and 1984, serious Internet viruses included Melessia (1999), Love letter (2000), Nimda (2001 - a bunch of worms and viruses)[3]. • Fragmentation Attacks: Fragmentation Attacks have occurred on the firewalls of Cisco checkpoints and routers from Cisco and Windows PCs. • Network infrastructure: Attacks targeting the network infrastructure can affect all Internet operations. Mostly, these types of attacks can create regional or global networks outside or slow down. A warning signal was sent to the root name server operators to reinforce the robustness of their infrastructure. • Protocol violation attacks: In protocol violation attacks, the attacker originally sends packets. Attacks that generally use invalid or reserved IP protocols are protocol breach attacks. Protocol (255) is reserved, and protocols (135-254) are not allocated according to the specified online powers [4]. • Buffer Overflow Attack: where in this attack a large data is sent to the targeted buffer in a certain machine, and the size of this data is larger than the buffer size, which cause to save the data on a different buffer and remove the needed data, exist on that buffer. • Email Bombing: where the inbox of a certain victim has been attacked with lots of emails. • Ping of Death: the ping command is used to send a huge amount of data in the same packet while the received computer cannot accept and process this size of the data, which will slow the processing on this machine and reduce the connection between that computer and any other server. • Smurf Attack: the ICMP protocol is used in this attack to obtain the same IP of the targeted machine and send back all the responses to the source machine with a larger bandwidth than the network bandwidth which is originally used. • Synchronisation Flood: the attacker takes the advantage of the TCP protocol of starting the synchronisation process, which reserve a server for further data that should be sent after the synchronisation packets. While the attacker aim is to keep the server, busy with many Synchronisation packet and do not send any actual data after that. • GET Flooding: the attacker in this attack generate many request packets using the HTTP protocol to a certain server that becomes busy with many GET messages from that client, and the server will also wait for the confirmation of these request, which never respond [5]. • Reflection Attacks: the attacker here use the UDP protocol to send many requests after spoofing the victim IP address [5]. • Amplification Attack: In this attack generating a large number of packets to target a victim website and use the DNS request after spoofing the source IP, address [5]. IV. METHODOLOGY We conducted a set of literature by conducting a comprehensive search on previous papers and surveys and collecting a large number of papers related to the topic. The study results from the last papers we used. We believe that the contributions contained in this survey are comprehensive and include a list of all-important contributions in the field to date. In this paper, cloud security problems and some security 164 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 6, 2020 mechanisms focus on eliminating and emphasizing them. Despite the need to reinforce existing security measures to provide more security in the cloud environment. V. RELATED WORK Andrew Carlina (2017) a number of low load systems have been specifically proposed for WBANS. Based on a review of these modern methods, it is clear that the cloud model presents new security vulnerabilities. However, he began to monitor new cloud-based systems themselves to defend against widespread DDoS attacks. This enables systems to adopt scalability features to enhance the cloud for all parties. It is also necessary to think about safety models in terms of protecting individual clients and their services as well as the cloud as a whole, he said. To develop an effective defence system, aspects of these research systems must be combined to protect from a wide range of attacks. A number of these devices use VMs as system administration units. This allows these systems to take advantage of the flexibility and scalability of the cloud model to provide a more effective attack response and help reduce system bottlenecks [6]. It was concluded that there are two main research methods that must be followed. First, the hack tries to hack VMs to launch The DDoS attacks against a target outside the cloud. Although this may seem like a simplified solution for outbound systems, it is not a widely adopted solution by CSPs as it adds to their overheads, although indirectly jam their infrastructure. Second, developing more traditional cloud infiltration defence mechanisms target of the attack is the cloud or any part in the cloud itself. Tasnuva Mahjabin (2017) in his survey, he provided a comprehensive and systematic analysis of DDoS attacks. It summarizes different types of attacks, filtering techniques, and methods for detecting attacks. However, his survey was an easy way to get the idea of DDoS attacks in which to systematically understand and analyse these attacks. Since his survey included recent attacks and recent researches against these attacks, it shows the current state of the attacks. It provides some discussions about DDoS attacks on unconventional systems such as clouds, smart grids, smart homes, CPS systems, and Internet of Things systems. As his study extracts an understanding of the search for DDoS attacks, it is important to understand the mechanisms for categorizing DDoS attacks in this survey. The author looks to analyse all the sorting of those attacks and provide an easy-to-understand classification mechanism. Gaurav Somani (2017) in his survey provides a detailed survey on the DDoS attacks and its defence mechanisms on the cloud-computing environment. It has been demonstrated through discussion that a DDoS attack is the primary form of a DDoS attack in the cloud [7]. There is a number of solutions to DDOS attack such as attack detection and attacks mitigation. Among these solutions, a few contributions target specific cloud features such as allocating resources to demand resources reconfiguration employ SDNs. We also provide a broad list of performance metrics for these solution categories for assessment and comparison. Seth Djane Kotey et al. (2016) concluded that with the increase in size, sophistication, and scale of modern DDoS attacks, further research is important to come up with very strong defences to fight these attacks. Some DDoS defence types are discussed in this survey. They classified defence mechanisms according to their main functions: detection, tracking, and mitigation. They also discussed their strengths and weaknesses. It has been discovered that most solutions conflict with scalability and may not be able to perform well in the real world, due to the increasing size of attack and traffic robots involved in recent attacks. Most of the current solutions also added some additional computing and additional expenses to the network, which will have an impact on the network, and some of them may slow down, in a real scenario with large amounts of attack traffic [8]. A comparison was made between the different mechanisms; however, not all solutions had results for the criteria they have used in the comparison. For such mechanisms, it will be tested to determine their actual performance based on the metrics chosen by them. Overall, most of the defensive solutions reviewed were performing reasonably well. Zargar et al. (2014) also provided an evaluation of the DDoS and OSI layer deployment mechanisms and defence system-based mechanisms: source-based, networked, and hybrid (hybrid) mechanisms. They also discussed the advantages, advantages, and disadvantages of defence mechanisms based on on-site deployment. In addition, the authors classified defence systems according to the time they start the process (before the attack or during the attack or after the attack). Then compared the performance of the defence mechanisms in accordance with the classifications they used. Following is a summary of the features, advantages, and disadvantages of defence mechanisms against DDoS flood attacks at the network/transport-level based on their deployment location. For the source-based, the detection and the response is done at the source hosts directly and the pros of this is that it aims to detect and to respond to the attack traffic at the source before to wastes lots of resources, and the cons is that the sources are distributed at different domains, hence it is hard for each source or detect bad filter each attack in an accurate way, besides it is difficult to differentiate DDoS attacks at the source, since the traffic volume is low, as it is not clear who would pay for these services [9]. For the destination-based, the detection and response tools are installed on the victims hosts, they are easy to set up and cheaper compared to other tools in detecting DDoS attacks as they can access to aggregated traffic near the destination sources, but they cannot accurately detect and respond to attacks before it reaches to the victim and can waste resources while the attack is on its wait to the victim. For the Network-based, the detection in response tools are deployed ate the network itself, one of its advantages is that it detects and responds to the attacks at the network and try to be closer to the attack source as it can, although some of its 165 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 6, 2020 disadvantages is it needs high storage and the overhead that happens on the routers is difficult to detect because of lack of aggregated traffic destined for the victims. In the hybrid model, the detection and the response tools are deployed at various locations; detections usually occurs at the victim side and the network, and the response usually takes place at the source and upstream routers near the source, the advantage of this Hybrid approach is that it is more robust against DDoS attacks and many resources can be used to stop the attacks, the disadvantages of this approach is the complexity and the overhead because of the communication that happens between many distributed components all over the internet. VI. DDOS PROTECTIVE CONTROLS In the survey conducted by Ahmed Bakr et al. (2019) prevention techniques are proactive, unlike detection and recovery that are reactive. Preventive controls must contain or eliminate the effects of a DDoS attack, and some techniques used to achieve this, following we will list some of these control and their techniques [10]. • Moving Target Defence (MTD): The Idea is rather than using layered defence by building static walls around your IT assets; it is working on making the attack surface dynamic. • Completely Automated Public Turing Test (CAPTCHA): CAPTCHA is considered the most widely used prevention control by web applications. The shield can be used to protect web applications from malicious programs like Bots [11]. • EDoS-Shield Mitigation: This approach relies on implementing a front-end virtual firewall that maintains white and blacklists for IP addresses. VII. DEFENSE AGAINST DDOS ATTACKS Cloud Computing is now more targeted from the attackers by the DoS attacks. Solutions are being figured to deal with such risky attacks. Generally, guarding against DDoS attacks can be classified into three main categories: preventing attacks, detecting attacks, and responding to attacks as shown in Fig. 1 [13]. The cloud pool of resources will be blocked from the user access when a DoS attack is detected. In addition, even without detecting DoS attack the prevention scenario can also stop the user from accessing the cloud resources. The prevention techniques may install different protection components on all the cloud sites such as the user system, the network controllers, the internet routers, and track the attacker site [14]. Furthermore, the security prevention and detection methods can be placed on the VM of the cloud services, which includes all the hosted operating system installed. While this process will have some characteristics impact on the cloud service such as limited the processing capacity, reduce the network access, reduce the outsourcing dependency, limit the enhancement of the available protocols used in the cloud, reduce the network bandwidth with extra overhead protocols, and increase the power consumption of these units attached to the cloud services [17]. Since mitigating DDoS attacks is challenging, efforts should be increased to prevent these attacks from happening. Most of the cloud service providers establish a set of procedures to treat all the rules and actions that would be used by the customers as a policy requirement. These procedures are mandatory to follow the participation in the cloud service activities used. Table I shows an example of how the procedures are linked to the DDoS attack. • sPoW (self-verifying Proof of Work): This approach relies on implementing a front-end virtual firewall that maintains white and blacklists for IP addresses. • DNS based techniques: By blocking these malicious namespaces through ISP or web filtering agents, it will help with preventing launching bots to perform DDoS attacks [12]. As discussed previously, detection accuracy might be higher on the victim side but not powerful; victims cannot stand the large volume of DDoS traffic. Stopping attacks on the source can be the best option to respond, but it is very difficult since the amount of traffic in the sources is not important to distinguish the project from the harmful traffic. Moreover, side damage is high in midway networks due to insufficient memory and CPU cycles to determine traffic. Therefore, the central mechanisms in which all defence components (i.e. prevention, detection, and response) are deployed on the same site, are not practical against DDoS flood attacks. Fig. 1. Defense Type Against DoS Attack. TABLE I. PROCEDURES TO DEAL WITH THE DDOS ATTACK [13] DDoS attack Procedure Before the DDoS attack To prevent DDoS attack the customer should use a firewall and prevent any unauthorized access and use proxies to connect to the hosts on the cloud pool. During the DDoS attack Stop most of the administrators’ access to the network services and reduce the traffic on the cloud hosts. After the DDoS attack A team of administrator should act on recovering all the services and track the down services. In addition to document the type of the attack and the reason behind the attack and update the policy to prevent it in the future. 166 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 6, 2020 There are also other classifications of the DDoS attacks on the cloud and the detection or prevention techniques used for these types of attacks as summarized below [14]. 1) Virtual machines level attacks: this kind of attack targeted the hypervisor layer in the virtual machines, and it needs an advanced cloud protection system is used that track the hosted virtual machines inside the hypervisor. 2) Resources Attack: this attack consumes all of the targeted system’s resources by many pieces of data packet send and received from the attacker Screen OS. 3) BGP Prefix Hijacking: This kind of attack happens by flooding many announcement about fake IP addresses related to fake systems to attract certain users. 4) Port Scanning: this attack target the default and the unprotected ports like HTTP that are always open to provide web services; this can be prevented by, securing ports with encryption and using firewalls. TABLE II. Types Source-based Mechanisms Using SDN Network-based Mechanisms Using SDN VIII. DDOS ATTACKS ON SDN OVERVIEW DDoS is increasing in the cloud computing environments due to the features of the cloud. With recent developments in Software Defined Networking (SDN), the SDN-based cloud provides is now a new opportunity to defeat DDoS attacks in cloud computing environments [15]. However, there is a contradictory relationship between SDN and DDoS attacks as shown in the different types in Table II. On the one hand SDN capabilities including existing traffic analysis software on the central control vision of the World Wide Web and the dynamic update for re-routing, make it easy to detect and respond to DDoS attacks. On the other hand, the SDN security itself remains to be addressed, and potential vulnerabilities in the DDoS system exist across SDN platforms. In the following table Qiao Yan, F. Richard Yu published in their survey called “Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges” lists a comparison of DDOS attacks defence mechanisms using SDN [16]. TYPES OF DDOS ATTACK ON SDN SDN capabilities exploited Description of the solution Programmability The programmable home network using the routing switches compatible with Open Flow and NOX as a controller detects security issues in SOHO. Traffic analysis Discover the access point, which is a converter that supports Open Flow is whereby the console Open Flow controller, malware by analysing traffic in real-time. Traffic analysis, dynamic rules updating and global views. Suggests VALVE that uses Open Flow protocol to resolve the problem of validating the source address with a view to improving the global SAVI solution. Traffic analysis and centralized control Use statistical information in the flow table to classify traffic as normal or harmful to self-organizing maps. Traffic analysis and dynamic rules updating A novel content-oriented networking architecture (CONA) can react to DDoS attacks by the use of accountability and content-aware supervision. Programmability And displays FRESCO, which is in the same application Open Flow limit. It can provide programming inspired by clicking frame. Abstraction ability An agent-based framework, Agnos, has been introduced to build collaborative SDNs that extend beyond enterprise networks and built on the abstraction provided by SDN. Programmability and dynamic rules updating An efficient memory system is proposed for distributed and collaborative monitoring of each stream called DCM. DCM uses Bloom filters to represent the monitoring rules and to install a custom and dynamic monitoring tool at the switch data level. Global views and centralized control Abstraction suggests full of resources and the provision of anti-DDoS and alignment with the network operations to provide, manage and control the protection of DDoS as a service within the system of environmental Open Flow. Dynamic rules updating It analyses the theoretical quantitative relationship between the probability that flow is successfully tracking number again jump level, and the probability of sampling independently, and the package number that includes the flow of the attack. Global views and centralized control It was built Net Sight, which is an extendable platform that captures the history of packages and applications can retrieve from the date of packets are concise and flexible packages of interest. Destination-based Mechanisms Using SDN 167 | P a g e www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 6, 2020 [6] IX. CONCLUSION Attacks on the Cloud Computing components and software become a daily issue especially after the wide use of it in various applications. The demand to have a stable cloud services with high availability to be offered for all the kind of device PCs, Laptops, and mobile is an urgent issue. The DDoS attack is one of the simplest and high redundant attack in the Cloud Computing environment where it has different types that attack different cloud computing resources. The Distributed resources and the multi virtual platforms inside these distributed resources are the main vulnerability in the cloud computing services. This paper discussed the most kinds of the DDoS attacks that targeted the pool of resources in the cloud computing and give the most defending procedures that is used to prevent, detect and recover the tracks of the DDoS attack and its damage. This damage may cause to stop the cloud service and may consume losing the data stored in the cloud without any backup or replica. The main way to protect the cloud is to define a policy for using the cloud resources and make rules based on the statistics threshold of the previous use of that service. ACKNOWLEDGMENT [2] [3] [4] [5] [8] [9] [10] [11] [12] [13] The author is grateful to the Middle East University, Amman, Jordan for the financial support granted to cover the publication fee of this research article. [1] [7] REFERENCES Ryan K.L. Ko, Kim-Kwang Raymond Choo, “Cloud Security Ecosystem”, Elsevier,pp.1-14, 2015 Taghavi Zargar, S., “Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks”, University of Pittsburgh, June 2014. Somani, G., Singh Gaur, M., Snaghi, D., and Conti, M., “DDoS attacks in cloud computing”, the international Journal of Computer and Telecommunications Networking, Vol. 109, November 2016. Ludiora, S., Abiona, O., Oluwatope, A., et al., “A user identity management protocol for cloud computing paradigm”, International Journal of Communication, Network, and System Science, Vol. 4, Issue 3, pp. 152–163, 2015. Han, J., &Kamber, M. (2018), “Data mining: Concepts and techniques (2ed Ed.)”, Beijing: China Machine Press. DDoS Attacks and Impacts on Various Cloud Computing Component, 2018. [14] [15] [16] [17] Hammoudeh, M., Aldabbas, O., “Intrusion Detection and Countermeasure of Virtual Cloud Systems - State of the Art and Current Challenges”, International Journal of Advanced Computer Science and Applications, Vol. 6, No. 6, 2015. Kalkan, K., Gur, G., and Alagoz, F., (2016), “Filtering-Based Defense Mechanisms Against DDoS Attacks: A Survey”, IEEE Systems Journal PP(99):1-13 · September 2016. Masdari, M., Jalali, M. (2016), “A survey and taxonomy of DoS attacks in cloud computing”, Security and Communication Networks, 13 July 2016 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1539. Malomo, O., Rawat, D., and Garuba, M. (2017), “A Survey on Recent Advances in Cloud Computing Security”, Journal of Next Generation Information Technology, Vol. 9, No. 1, March 2018. Bakr, A., Abd El-Aziz, A., and Hefny, H. (2019), “A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture”, International Journal of Advanced Science and Technology, Vol.28, No. 12, 2019. Aldaej, A., “Information Security and Distributed Denial of Service Attacks : A Survey”, the 2017 International Conference on Electrical and Computing Technologies and Application (ICECTA), UAE, November 2017. Zargar S., Joshi, J., and Tipper D., (2014), “A Survey of Defense Mechanisms against Distributed Denial of Service (DDoS) Flooding Attacks”, IEEE communications surveys & tutorials, Vol. 15, No. 4, 2013. Alsowail S., Sqalli, M., Abu Amara, M., Baig, Z., and Salah, K., “An Experimental Evluation of the EDoS-Shield Mitigation Technique for Securing the Cloud”. Arabian Journal for Science and Engineering, Vol. 41, No. 12, pp.5037– 5047, May 2016. Ubale, T., and Jain, A. K., “Survey on DDoS Attack Techniques and Solutions in Software-Defined Network”, Springer International Publishing, 2020. Yan, Q., Yu, F.R., Gong, Q., Li, J., “Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges”, IEEE Communications Surveys and Tutorials, Vol. 18, Issue 1, 2016. El-Sofany, H., El-Seoud, S., and Taj-Eddin, I., “Case Study of the Impact of Denial of Service Attacks in Cloud Applications”, Journal of Communications, Vol. 14, No. 2, February 2019. Abusaimeh, H. and Yang, S.H., “Reducing the transmission and reception powers in the AODV”, Proceedings of the 2009 IEEE International Conference on Networking, Sensing and Control, ICNSC 2009, pp. 60-65, 2009. 168 | P a g e www.ijacsa.thesai.org