A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 6
Abstract
Mobile Ad Hoc Network (MANET) is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the scope of security compromising. One of the easy ways of security compromise is denial of services (DoS) form of attack, this attack may paralyze a node or the entire network and when coordinated by group of attackers is considered as distributed denial of services (DDoS) attack. A typical, DoS attack is flooding excessive volume of traffic to deplete key resources of the target network. In MANET flooding can be done at routing. Ad Hoc nature of MANET calls for dynamic route management. In flat ad hoc routing categories there falls the reactive protocols sub category, in which one of the most prominent member of this subcategory is dynamic source routing (DSR) which works well for smaller number of nodes and low mobility situations. DSR allows on demand route discovery, for this they broadcast a route request message (RREQ). Intelligently flooding RREQ message there forth causing DoS or DDoS attack, making targeted network paralyzed for a small duration of time is not very difficult to launch and have potential of loss to the network. After an attack on the target system is successful enough to crash or disrupt MANET for some period of time, this event of breach triggers for investigation. Investigation and forensically analyzing attack scenario provides the source of digital proof against attacker. In this paper, the parameters for RREQ flooding are pointed, on basis of these parameters fuzzy logic based rules are deduced and described for both DoS and DDoS. We implemented a fuzzy forensic tool to determine the flooding RREQ attack of the form DoS and DDoS. For this implementation various experiments and results are elaborated in this paper.
Authors and Affiliations
Ms. Sarah Ahmed, Ms. S. Nirkhi
FNN based Adaptive Route Selection Support System
This paper presents Fuzzy Neural Network (FNN) based Adaptive Route Selection Support System (ARSSS) for assisting drivers of vehicles. The aim of the proposed ARSSS system is to select path based on shortest possible ti...
Image Retrieval System based on Color Global and Local Features Combined with GLCM for Texture Features
In CBIR (content-based image retrieval) features are extracted based on color, texture, and shape. There are many factors affecting the accuracy (precision) of retrieval such as number of features, type of features (loca...
Empirical Study of Segment Particle Swarm Optimization and Particle Swarm Optimization Algorithms
In this paper, the performance of segment particle swarm optimization (Se-PSO) algorithm was compared with that of original particle swarm optimization (PSO) algorithm. Four different benchmark functions of Sphere, Rosen...
Exploiting Document Level Semantics in Document Clustering
Document clustering is an unsupervised machine learning method that separates a large subject heterogeneous collection (Corpus) into smaller, more manageable, subject homogeneous collections (clusters). Traditional metho...
Simulation and Evaluation of a Simple Adaptive Antenna Array for a WCDMA Mobile Communication
This paper presents a uniform Linear Array model of a simple adaptive antenna array based on signal-tointerference and noise ratio (SINR) maximization. The SINR using the adaptive antenna array was investigat...