Defining Categories to Select Representative Attack Test-Cases in MANETs

MANETs are a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to the flexibility provided by their dynamic infrastructure MANETs are vulnerable to many types of security attacks. Furthermore, many conventional security solutions have been developed. However, these proposals suffer from the problems of tests and evaluations. Among these solutions the intrusion detection systems (IDS). To improve the quality of protection of MANETs provided by intrusion detection systems (IDS), we provide assessment of detection and test procedures more effective. In this paper, we make a thorough analysis of existing attacks. For this we propose a new system to classify attacks based on attributes that appear to be the best classification criteria to generate test-cases. We also apply the classification tree method (CTM) to select test-cases to attack. Finally, we use the CTE (Classification Tree Editor) tool to generate and select test-cases.

[1]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[2]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[3]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[4]  Ray Hunt,et al.  A taxonomy of network and computer attacks , 2005, Comput. Secur..

[5]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[6]  Mostafa Azizi,et al.  Amelioration of Attack Classifications for Evaluating and Testing Intrusion Detection System , 2010 .

[7]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[8]  Jaydip Sen,et al.  Reputation- and Trust-Based Systems for Wireless Self-organizing Networks , 2011, ArXiv.

[9]  Ahmed Patel,et al.  Comparative review study of reactive and proactive routing protocols in MANETs , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[10]  R. Dorf,et al.  The handbook of ad hoc wireless networks , 2003 .

[11]  Michel Barbeau,et al.  Handling Security Threats to the RFID System of EPC Networks , 2016 .

[12]  Matthias Grochtmann,et al.  Test Case Design Using Classification Trees and the Classification-Tree Editor CTE , 1995 .

[13]  N. Paulauskas,et al.  Computer System Attack Classification , 2006 .

[14]  Xiaoyan Hong,et al.  A new set of passive routing attacks in mobile ad hoc networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[15]  Panagiotis Papadimitratos,et al.  Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.

[16]  Mohit Kumar,et al.  An Overview of MANET: History, Challenges and Applications , 2012 .

[17]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..

[18]  John A. Clark,et al.  Security Threats in Mobile Ad Hoc Networks , 2009 .

[19]  Victor Govindaswamy,et al.  Survey of Recent Position Based Routing Mobile Ad-hoc Network Protocols , 2011, 2011 UkSim 13th International Conference on Computer Modelling and Simulation.

[20]  Arobinda Gupta,et al.  Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey , 2010 .

[21]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[22]  Glenford J. Myers,et al.  Art of Software Testing , 1979 .

[23]  Dominique Alessandri,et al.  Attack-class-based analysis of intrusion detection systems , 2004 .

[24]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..