Open Access Open Access  Restricted Access Subscription or Fee Access

Anomaly Detection for Denial of Service Attacks and Malicious Flooding in MANETs

A.D. Jeishri, Dr.M. Rajesh Babu

Abstract


MANETs (Mobile Ad hoc Networks) is the self configuring network formed by mobile nodes which are connected by wireless links. Due to the mobility and independent topology, there occur many routing attacks which corrupt the topology of the network. Among several attacks, the Denial of Service (DoS) attacks and Resource Consumption attacks are the harmful attacks in the MANETs since these attacks interrupt the network resource unavailable to its user and resource consumption attack wastes the resources of a specific node. Example for DoS attacks are Black hole and worm hole attack. In Black hole attack, the malicious node sends a forged Route Reply (RREP) packet to a source node that initiates the route discovery in order to pretend to be a destination node and the Wormhole attack is otherwise known as Tunneling attack. The attacker forwards packets through a high quality out of bond link and reply these packets at another location in the network. In this paper, a new method is proposed to detect the anomalies by using the threshold values. Based on these values, the normal nodes could be detected and differentiated from the anomaly nodes. The packets are then made to send through the normal nodes excluding the anomaly nodes. The simulation results show the effectiveness of the proposed method which detects the DoS attacks and malicious flooding attack.


Keywords


Anomaly Detection Scheme, AODV, DoS Attack, Malicious Flooding, MANETs.

Full Text:

PDF

References


Hidehisa Nakayama, Satoshi Kurosawa, Abbas Jamalipour, Yoshiaki Nimoto, Nei Kato,”A Dynamic Anamoly Detection Scheme For AODV- Based Mobile Ad Hoc Networks”, IEEE transaction on Vehicular Technology Society, Vol.,58,No.5,June 2009.

Y. A. Huang, W. Fan, W. Lee, and P. S. Yu, “Cross feature analysis for detecting ad-hoc routing anomalies,” in the proceeding 23rd International Conference on Distributed Computing Systems (ICDCS’03), pp. 478- 487, May 2003.

C. E. Perkins, E. M. B. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) routing”, RFC 3561, July 2003.

B. Sun, K. Wu, and U. Pooch, “Towards adaptive intrusion detection in mobile ad hoc networks,” in Proceeding of IEEE Global Telecommun. Conference GLOBECOM, pp. 3551–3555, Nov. /Dec. 2004.

Y. A. Huang and W. Lee, “Attack analysis and detection for ad hoc routing protocols,” in The 7th International Symposium on Recent Advances in Intrusion Detection (RAID’04), pp. 125-145, French Riviera, Sept. 2004.

Fei Xing and Wenye Wang, “Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks”, IEEE Conference on Network Security, Nov 2006.

Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannins and Y. Yesha, “ Threshold- based intrusion detection in ad hoc networks and secure AODV,” Vol.6, No. 4, pp.578-599, 2008.

A. Vani and D.Sreenivasa Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks,” International Journal on Computer Science and Engineering (IJCSE), Vol. 3 No. 6 June 2011.

Petar Djukic and Biswajit Nandy, “On Threshold Selection for Principal Component Based Network Anomaly Detection,” ,” Communication Networks and Services Research Conference (CNSR), 2011 Ninth Annual, pp. 117 – 122, May 2011.

Akanksha Saini, Harish kumar,”Effect of Blackhole Attack on AODV Routing Protocol in MANETs”, IJCST vol .1,issue 2, Dec. 2010.

Reena Sahoo and Dr. P M Khilar,” Detecting Malicious Nodes in MANET based on a Cooperative Approach”, IJCA Special Issue on 2nd National Conference- Computing, Communication and Sensor Network (CCSN) (4):46-51, 2011. Published by Foundation of Computer Science, New York, USA

R. Duda, P. Hart, and D. Stork, “Pattern Classification and Scene Analysis,” New York: Wiley, 1973.

D. Maltz, J. Broch, J. Jetcheva, and D. Johnson, “The effects of on demand behavior in routing protocols for multihop wireless ad hoc networks,” IEEE J. Sel. Areas Commun., vol. 17, no. 8, pp. 1439–1453,Aug. 1999.

C. Perkins, E. Royer, S. Das, and M. Marina, “Performance comparison of two on-demand routing protocols for ad hoc networks,” IEEE Pers. Commun., vol. 8, no. 1, pp. 16–28, Feb. 2001.

T. Camp, J. Boleng, and V. Davies, “A Survey of mobility models for ad hoc network research,” Wireless Communication Mobile Computing, Vol. 2, no. 5, pp. 483-502, Sep. 2002.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.