LDoS attack in ad-hoc network

LDoS (Low-rate Denial of Service) attack is periodic, stealthy, and with high efficiency, which has become a great threat to the network security. Previous researches about LDoS attack mainly focus on its impact on wired networks. However, our analysis shows that such attack could also be launched in Ad-hoc network, and as a completely distinct MAC layer protocol is adopted in this environment, the form and effect of the attack could be different and need re-evaluation. This paper presents a study of LDoS attack in Ad-hoc network: (1) We investigate the differences of attack form brought by the medium reservation mechanism and CSMA/CA of 802.11b, and find that decreasing the period of LDoS attack into a smaller time scale would achieve a higher attack efficiency; (2) We show that the attack effect differs from that in wired networks, and the attacker's location has an impact on it; (3) We verify our findings by simulation experiments in NS-2; (4) Detection and defense methods are explored to counter against such attack.

[1]  Kai Hwang,et al.  Collaborative detection and filtering of shrew DDoS attacks using spectral analysis , 2006, J. Parallel Distributed Comput..

[2]  Mina Guirguis,et al.  Exploiting the transients of adaptation for RoQ attacks on Internet resources , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[3]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[4]  Mario Gerla,et al.  Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED , 2003, MobiCom '03.

[5]  Mina Guirguis,et al.  Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[6]  Aleksandar Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.

[7]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[8]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[9]  Ansi Ieee,et al.  Part11 : Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .

[10]  Cao Qiang Distributed Collaborative Detection Method for LDoS Attacks , 2009 .

[11]  Hongqiang Zhai,et al.  TCP performance over mobile ad hoc networks , 2004, Canadian Journal of Electrical and Computer Engineering.

[12]  Han Yi,et al.  A survey of Low-rate Denial-of-Service attacks , 2008 .

[13]  Eitan Altman,et al.  A survey of TCP over ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[14]  Haiyun Luo,et al.  The impact of multihop wireless channel on TCP throughput and loss , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[15]  Xiapu Luo,et al.  Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[16]  Songwu Lu,et al.  Design and implementation of a TCP-friendly transport protocol for ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[17]  Mario Gerla,et al.  TCP performance over multipath routing in mobile ad hoc networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[18]  Yuting Zhang,et al.  Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Xiapu Luo,et al.  On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.

[20]  David K. Y. Yau,et al.  Distributed mechanism in detecting and defending against the low-rate TCP attack , 2006, Comput. Networks.

[21]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[22]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.