DDoS Attack and Defense Scheme in Wireless Ad hoc Networks

The wireless ad hoc networks are highly vulnerable to distributed denial of service(DDoS) attacks because of its unique characteristics such as open network architecture, shared wireless medium and stringent resource constraints. These attacks throttle the tcp throughput heavily and reduce the quality of service(QoS) to end systems gradually rather than refusing the clients from the services completely. In this paper, we discussed the DDoS attacks and proposed a defense scheme to improve the performance of the ad hoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The status values from MAC layer that can be used for detection are Frequency of receiving RTS/CTS packets, Frequency of sensing a busy channel and the number of RTS/DATA retransmissions. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users. We perform the simulation with Network Simulator NS2 and we proved that our proposed system improves the network performance. Wireless networks are inherently susceptible to security problems. The intrusion on the transmission medium is easier than for wired networks and it is possible to conduct denial of service attacks by scrambling the used frequency bands. The ad hoc context increases the number of potential security vulnerabilities. Ad hoc networks can not benefit from the security services offered by dedicated equipment such as firewalls, authentication servers and so on. The security services must be distributed, cooperative and consistent with the available bandwidth. One of the serious attacks to be considered in ad hoc network is DDoS attack. A DDoS attack is a large-scale, coordinated attack on the availability of services at a victim system or network resource. The DDoS attack is launched by sending an extremely large volume of packets to a target machine through the simultaneous cooperation of a large number of hosts that are distributed throughout the network. The attack traffic consumes the bandwidth resources of the network or the computing resource at the target host, so that legitimate requests will be discarded. A bandwidth depletion attack is designed to flood the victim network with unwanted traffic that prevents legitimate traffic from reaching the victim system. A resource depletion attack is an attack that is designed to tie up the resources of a victim system. This type of attack targets a server or process at the victim making it unable to legitimate requests for service. Any amount of resources can be exhausted with a sufficiently strong attack. The only viable approach is to design defense mechanism that will detect the attack and respond to it by dropping the excess traffic. The DoS attacks that target resources can be grouped into three broad scenarios. The first attack scenario targets Storage and Processing Resources. This is an attack that mainly targets the memory, storage space, or CPU of the service provider. Consider the case where a node continuously sends an executable flooding packet to its neighborhoods and to overload the

[1]  Y. Venkataramani,et al.  A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks , 2010, Inf. Secur. J. A Glob. Perspect..

[2]  Mohammad Najmud Doja,et al.  Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs , 2008 .

[3]  Sugata Sanyal,et al.  A distributed security scheme for ad hoc networks , 2004, CROS.

[4]  Chu-Hsing Lin,et al.  Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[5]  Qi Shi,et al.  Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks , 2005, SEC.

[6]  Andrew T. Campbell,et al.  SWAN: service differentiation in stateless wireless ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[7]  Nirwan Ansari,et al.  A router-based technique to mitigate reduction of quality (RoQ) attacks , 2008, Comput. Networks.

[8]  Xiapu Luo,et al.  Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals , 2009, EURASIP J. Adv. Signal Process..

[9]  Sugata Sanyal,et al.  Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.

[10]  Sukumar Nandi,et al.  QoS Aware Stable path Routing (QASR) Protocol for MANETs , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[11]  David K. Y. Yau,et al.  Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach , 2007, ASIACCS '07.

[12]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[13]  Giovanni Vigna,et al.  An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.

[14]  Wei Ren Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks , 2007, Int. J. Netw. Secur..

[15]  Shiyong Zhang,et al.  A New Routing Attack in Mobile Ad Hoc Networks , 2005 .

[16]  K. Chandra Sekaran Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks , 2007 .

[17]  A. Rajaram,et al.  The Trust-Based MAC - Layer Security Protocol for Mobile Ad Hoc Networks , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[18]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.