A Fuzzy Forensic Analysis System for DDoS Attack in MANET

Mobile Ad-Hoc Network (MANET) is a distributed wireless communication network that comprises, wireless mobile nodes that dynamically self organize into ad hoc topologies. In, MANET the nodes in network can seamlessly interconnect with each other without pre-existing infrastructure. MANET feature make it scalable, as well as chances of security threats increases. As, in MANET the nodes in network can dynamically connect make it scalable, but the scope that malicious node may enter in the normal working network is increased. An easy to launch attack is the denial of services (DoS), in which attacker paralyses the target network when coordinated by group of attackers is considered as distributed denial of services (DDoS). DoS attack caused by flooding excessive volume of traffic to deplete key resources of the target network, need not require special capabilities. Dynamic nature of MANET calls for self route management routing protocol like DSR. DoS/DDoS attacks at discovery phase of DSR to discover the route could be launched by attackers/malicious node by flooding the route request message (RREQ) causing damage to normal network for some duration of time. When an attack on the target system is successful enough to crash or disrupt, this event as the breach, triggers investigation. Forensic investigation and analysis provide source of digital evidence. There is a quest to answer the question related security breach and requirement to provide the proof against the malicious activity & for this network forensic is done and forensic analysis system tool is required. Flooding RREQ violating broadcasting rules can be recognizable, but if done intelligently is difficult to recognize. So, for forensic analysis there is a need of intelligent tool. In this paper, we elaborated over a fuzzy forensic analysis system.

[1]  Sarah Ahmed,et al.  A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET , 2013 .

[2]  Ying Zhu,et al.  Attack Pattern Discovery in Forensic Investigation of Network Attacks , 2011, IEEE Journal on Selected Areas in Communications.

[3]  C.-H. Chu,et al.  Tactical bandwidth exhaustion in ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[4]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[5]  Ivan Lee,et al.  Forensic Analysis of DoS Attack Traffic in MANET , 2010, 2010 Fourth International Conference on Network and System Security.

[6]  Joong Soo Ma,et al.  Mobile Communications , 2003, Lecture Notes in Computer Science.

[7]  J. Slay,et al.  The Need for a Technical Approach to Digital Forensic Evidence Collection for Wireless Technologies , 2006, 2006 IEEE Information Assurance Workshop.

[8]  Y. Tatar,et al.  Detection SYN Flooding Attacks Using Fuzzy Logic , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[9]  Dong-Geun Kim,et al.  A fuzzy logic based expert system as a network forensics , 2004, 2004 IEEE International Conference on Fuzzy Systems (IEEE Cat. No.04CH37542).

[10]  Yinghua Guo,et al.  Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks , 2010, 2010 Fourth International Conference on Network and System Security.

[11]  Noureddine Boudriga,et al.  A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks , 2009, 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering.

[12]  S. Nirkhi,et al.  Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis , 2013 .

[13]  Randall K. Nichols,et al.  Wireless Security: Models, Threats, and Solutions , 2001 .