1 / 31

Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks

MIPRO 2012, May 21-25,2012, Opatija, Croatia. Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks. Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek***. 102062517 資工所碩一 陸家鈞. 1/31. outline. Abstract Introduction Routing Protocols Security Attacks On Routing Protocols

dmalone
Télécharger la présentation

Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MIPRO 2012, May 21-25,2012, Opatija, Croatia Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** 102062517 資工所碩一 陸家鈞 1/31

  2. outline • Abstract • Introduction • Routing Protocols • Security Attacks On Routing Protocols • Classification Of DOS Attack Detection Scheme • Conclusion 2/31

  3. Abstract The mobile ad-hoc networks (MANET) are multi-hop wireless network. It is dynamically formed amongst groups of mobile users having wireless network. 3/31

  4. Abstract In MANET, nodes are limited resources like bandwidth, battery power and storage space. MANET is vulnerable of different types of DoS attack in which packets are not transfer to the next node. 4/31

  5. Introduction The mobile ad-hoc networks (MANET) It has different characteristics such as lack of centralized administration, distributed cooperation, changing topology and requires no existing infrastructure. Without router or access point wireless clients connect directly together. 5/31

  6. Routing Protocols General categories of routing protocols: • Proactive Routing Protocol: • Reactive Routing Protocol: • Hybrid Routing Protocol: 6/31

  7. 1. Proactive (table-driven) Routing Protocol • Mobile nodes periodically broadcasttheirrouting information to the next node. • Eachnodeneeds to maintain the records of theadjacent andreachable nodes • Nodes have to evaluate their neighborhood as per the network topology change. 7/31

  8. 2. Reactive (On-demand) Routing Protocol If a node wants to send packet to another node then the protocol searches for the route in on demand and establish the connection in order to transmit and receive the packet. 8/31

  9. 3. Hybrid Routing Protocol: combines the advantages of proactive routing and reactive routing • gathering unfamiliar routing information • maintain the routing information when network topology changes. 9/31

  10. Security Attacks On Routing Protocols General attack types are threats against network layers that function for the routing mechanism of the mobile ad hoc networks. There are two basic types of attacks in mobile ad hoc networks: • Passive attacks • Active attacks 10/31

  11. Passive attacks: This type of attack does not disrupt the normal operation of the network. Detection of passive attacks is difficult to identify because the network operation is normal. Passive attacks are eavesdropping, traffic analysis and monitoring. • Active attacks: an attacker actively participates and disrupts the normal operation of the network services. It degrades the network performance. Forms of active attacks are jamming, spoofing, modification, replaying and Denial of Service (DoS). 11/31

  12. Attacks on MANET: • Denial of Service Attacks • Black hole attack • Cooperative Black hole attack • Gray hole attack • Flooding Attack • Worm hole Attack • Jamming attack • DDoS attack • Rushing attack • JellyFish attack 12/31

  13. 1. Denial of Service Attacks: • The goal of Denial of Service (DoS) attacks is to prevent availability of networks services from their legitimate users • DoS attack has different scenarios. • Attack memory, storage, CPU of the service provider • Sends an executable flooding packet • Attack energy resources • Sends a bogus packet to a node with the intension • Attack bandwidth • Located between multiple communicating nodes and waste the bandwidths and disrupt the connectivity 13/31

  14. 2.Black hole attack: The malicious node can attract all packets by pretending shortest route to the destination. It drops all traffic destined for that node when traffic is received by it. The effect of this attack completely degrades the performance of the network 14/31

  15. 3. Cooperative Black hole attack: It is a type of black hole attack when multiple black hole nodes are acting in a coordinated manner with each other: e.g.black hole node B1 cooperates with another black hole node B2 in the next hop. 15/31

  16. 4. Gray hole attack: • Gray hole attack is a variation of black hole attack, where some nodes switch their states from black hole to honest intermittently and vice versa. • Detection of gray hole attack is harder because nodes can drop packets partially not only due to its malicious nature but also due to congestion. S D Attacker 16/31

  17. 5. Flooding Attack: Attacker selects many IP addresses which are from outside of the networks . Attacker sends Route Request (RREQ) message with such IP address. 17/31

  18. 6. Worm hole Attack: Worm hole link attack records the wireless data, forward this data and replays the packet through worm hole link. It will not show the true picture of the network and there is effect on the decisions. 18/31

  19. 7. Jamming attack: The objective of jammer is to interfere with legitimate wireless communication and to degrade the overall network performance. • Constant jammer • Deceptive jammer • Radom jammer • Reactive jammer 19/31

  20. 8. DDoS attack: DDoS attack consists of two phases • Deployment phase: an attacker installs a tool in the vulnerable nodes. • Attack phase: an attacker coordinates a attack against a victim by flooding the unwanted data 20/31

  21. 9. Rushing attack: • The attack consists, for the adversary, in quickly forwarding its Route Request messages when a route discovery is initiated. If the Route Requests that first reach the target’s neighbors are those of the attacker, then any discovered route includes the attacker. S Attacker D 21/31

  22. 10. JellyFish attack: JellyFish attack is following the routing and forwarding protocol specification. This is passive type of attack which is difficult to detect. It is responsive to the network conditions like delay and packet drop rate. S D Attacker 22/31

  23. 10. JellyFish attack: • Behavior of JellyFish attacks are JellyFish Recorder Attack: • reorder packets JellyFish Periodic Dropping Attack: • drop all packets JellyFish Delay Variance Attack: • randomly delays packets 23/31

  24. Classification Of DOS Attack Detection Scheme 24/31

  25. Black hole attack • Solution / Security Mechanism 25/31

  26. Cooperative Black hole attack • Solution / Security Mechanism 26/31

  27. Gray hole attack • Solution / Security Mechanism Flooding attack • Solution / Security Mechanism 27/31

  28. Worm hole attack • Solution / Security Mechanism Jamming attack • Solution / Security Mechanism 28/31

  29. Distributed Dos attack • Solution / Security Mechanism JellyFish attack • Solution / Security Mechanism Rushing attack • Solution / Security Mechanism 29/31

  30. Contribution&Improvement • Contribution • Explain the routing protocols on MANET • Explain attacks on MANET • List the solutions and reference resources of attacks. • Improvement • More graphical example • Detail about solution 30/31

  31. Conclusion This type of attack may lead to degrade the performance of the network. There is need to develop efficient security mechanism and secure routing protocols for avoiding different types of attacks. And we must encrypt the data what we sent over the network to reduce the chance of packet eavesdropping 31/31

More Related