Attack analysis and detection for ad hoc routing protocols

被引:0
|
作者
Huang, YA [1 ]
Lee, W [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
关键词
MANET; attack analysis; intrusion detection; routing security; AODV;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Network (MANET). In this paper, we present a systematic approach to analyze attacks. We introduce the concept of basic events. An attack can be decomposed into certain combinations of basic events. We then define a taxonomy of anomalous basic events by analyzing the basic security goals. Attack analysis provides a basis for designing detection models. We use both specification-based and statistical-based approaches. First, normal basic events of the protocol can be modeled by an extended finite state automaton (EFSA) according to the protocol specifications. The EFSA can detect anomalous basic events that are direct violations of the specifications. Statistical learning algorithms, with statistical features, i.e., statistics on the states and transitions of the EFSA, can train an effective detection model to detect those anomalous basic events that are temporal and statistical in nature. We use the AODV routing protocol as a case study to validate our research. Our experiments on the MobiEmu wireless emulation platform show that our specification-based and statistical-based models cover most of the anomalous basic events in our taxonomy.
引用
收藏
页码:125 / 145
页数:21
相关论文
共 50 条
  • [1] Analysis of Routing Protocols for Ad Hoc Networks
    Desai, Rahul
    Patil, B. P.
    2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA), 2014, : 111 - 115
  • [2] Comparative Performance Analysis of Routing Protocols in Mobile Ad Hoc Networks under JellyFish Attack
    Wazid, Mohammad
    Kumar, Vipin
    Goudar, R. H.
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 147 - 152
  • [3] Performance analysis for Ad Hoc QoS routing protocols
    Gerasimov, I
    Simon, R
    INTERNATIONAL MOBILITY AND WIRELESS ACCESS WORKSHOP (MOBIWAC 2002), PROCEEDINGS, 2002, : 87 - 94
  • [4] On Energy Consumption Analysis for Ad hoc Routing Protocols
    Singh, Vishwanath Pratap
    Mazumdar, Arka Prokash
    Sairam, Ashok Singh
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 300 - 306
  • [5] THE EFFECTIVENESS OF MOBILE AD HOC ROUTING PROTOCOLS UNDER A GRAY HOLE ATTACK
    Mahlous, Ahmed Redha
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2019, 11 (01): : 59 - 72
  • [6] Research on security of routing protocols against wormhole attack in the ad hoc networks
    Hua, Huang Wen
    Hua, H.W. (hwh_xa@126.com), 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (12): : 255 - 264
  • [7] Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 30 - +
  • [8] Rushing Attack Against Routing Protocols in Mobile Ad-Hoc Networks
    Ghoreishi, Seyed-Mohsen
    Abd Razak, Shukor
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 220 - 224
  • [9] On the scalability of ad hoc routing protocols
    Santiváñez, CA
    McDonald, B
    Stavrakakis, I
    Ramanathan, R
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1688 - 1697
  • [10] Cartesian ad hoc routing protocols
    Hughes, L
    Shumon, K
    Zhang, Y
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 287 - 292