A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET

Abstract

Mobile Ad Hoc Network (MANET) is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the scope of security compromising. One of the easy ways of security compromise is denial of services (DoS) form of attack, this attack may paralyze a node or the entire network and when coordinated by group of attackers is considered as distributed denial of services (DDoS) attack. A typical, DoS attack is flooding excessive volume of traffic to deplete key resources of the target network. In MANET flooding can be done at routing. Ad Hoc nature of MANET calls for dynamic route management. In flat ad hoc routing categories there falls the reactive protocols sub category, in which one of the most prominent member of this subcategory is dynamic source routing (DSR) which works well for smaller number of nodes and low mobility situations. DSR allows on demand route discovery, for this they broadcast a route request message (RREQ). Intelligently flooding RREQ message there forth causing DoS or DDoS attack, making targeted network paralyzed for a small duration of time is not very difficult to launch and have potential of loss to the network. After an attack on the target system is successful enough to crash or disrupt MANET for some period of time, this event of breach triggers for investigation. Investigation and forensically analyzing attack scenario provides the source of digital proof against attacker. In this paper, the parameters for RREQ flooding are pointed, on basis of these parameters fuzzy logic based rules are deduced and described for both DoS and DDoS. We implemented a fuzzy forensic tool to determine the flooding RREQ attack of the form DoS and DDoS. For this implementation various experiments and results are elaborated in this paper.

Authors and Affiliations

Ms. Sarah Ahmed, Ms. S. Nirkhi

Keywords

Related Articles

Design of 1-bit Comparator using 2 Dot 1 Electron Quantum-Dot Cellular Automata

In nanotechnologies, quantum-dot cellular automata (QCA) offer promising and attractive features for nano-scale computing. QCA effectively overcomes the scaling shortfalls of CMOS technology. One of the variants of QCA i...

  The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hotels in Ghana

  The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot...

Predictive Performance Comparison Analysis of Relational & NoSQL Graph Databases

From last three decades, the relational databases are being used in many organizations of various natures such as Education, Health, Business and in many other applications. Traditional databases show tremendous performa...

Explore the Major Characteristics of Learning Management Systems and their Impact on e-Learning Success

Today, there are many educational institutions and organizations around the world, especially the universities have adopted the e-learning and learning management system concepts because they want to enhance and support...

The Development Process of the Semantic Web and Web Ontology

This paper deals with the semantic web and web ontology. The existing ontology development processes are not catered towards casual web ontology development, a notion analogous to standard web page development. Ontologie...

Download PDF file
  • EP ID EP130693
  • DOI 10.14569/IJACSA.2013.040626
  • Views 96
  • Downloads 0

How To Cite

Ms. Sarah Ahmed, Ms. S. Nirkhi (2013). A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET. International Journal of Advanced Computer Science & Applications, 4(6), 193-197. https://europub.co.uk/articles/-A-130693