Computer Science – Networking and Internet Architecture
Scientific paper
2005-08-02
Computer Science
Networking and Internet Architecture
Scientific paper
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promising solution to take a proper countermeasure near the attack origins, to discourage attackers from launching attacks, and for forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a challenging problem due to the dynamic topology, and limited network resources. It is especially difficult to trace back attacker(s) when they are moving to avoid traceback. In this paper, we introduce the ATTENTION protocol framework, which pays special attention to MAC layer abnormal activity under attack. ATTENTION consists of three classes, namely, coarse-grained traceback, fine-grained traceback and spatio-temporal fusion architecture. For energy-efficient attacker searching in MANETs, we also utilize small-world model. Our simulation analysis shows 79% of success rate in DoS attacker traceback with coarse-grained attack signature. In addition, with fine-grained attack signature, it shows 97% of success rate in DoS attacker traceback and 83% of success rate in DDoS attacker traceback. We also show that ATTENTION has robustness against node collusion and mobility.
Helmy Ahmed
Kim Yongjin
No associations
LandOfFree
ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-615475