An Efficient Algorithm for TCP Attacker Traceback and Countermeasures in MANET using Agents

Print
IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015)
© 2015 by IJCA Journal
ICICT 2015 - Number 1
Year of Publication: 2015
Authors:
P. Ramesh
H. Abdul Rauf
P. Mahalakshmi

P.ramesh, H.abdul Rauf and P.mahalakshmi. Article: An Efficient Algorithm for TCP Attacker Traceback and Countermeasures in MANET using Agents. IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015) ICICT 2015(1):1-5, July 2015. Full text available. BibTeX

@article{key:article,
	author = {P.ramesh and H.abdul Rauf and P.mahalakshmi},
	title = {Article: An Efficient Algorithm for TCP Attacker Traceback and Countermeasures in MANET using Agents},
	journal = {IJCA Proceedings on International Conference on Innovations in Computing Techniques (ICICT 2015)},
	year = {2015},
	volume = {ICICT 2015},
	number = {1},
	pages = {1-5},
	month = {July},
	note = {Full text available}
}

Abstract

TCP based Denial of Service attacks can cause major problems in Mobile Ad hoc Networks. Tracing the attacker's originand introducing a proper action to retaliate the attacker are the enduring tasks. Surviving methods suffer from major problems due to the typical behavior of Mobile Ad hoc Networks. Then a new bracing methodology is introduced to detect the type of attack and it's origin in MANET using Traffic report. Based on simulations, the attacker origin is tracked down and gives proper countermeasures to retaliate the attack in Mobile Ad hoc Network with low overhead in both communication and computation.

References

  • H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," Proceedings of IEEE INFOCOM, 2002, pp. 1530-1539.
  • Kamanshis Biswas, Md. Liakat Ali, "Security Threats in Mobile Ad Hoc Network", 2007
  • R. Gill, J. Smith, M. Looi, and A. Clark. "Passive Techniques for De- tecting Session Hijacking Attacks in IEEE 802. 11 Wireless Networks". In Proceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCert 2005).
  • RFC 4987 - TCP flooding attacks and common mitigations.
  • Seung- won Shin, Ki- young Kim, Jong- soo Jang. "Seung-won Shin, Ki-young Kim, Jong-soo Jang, "D-SAT: Detecting SYN flooding attack by two-stage statistical approach," The Symposium on applications and the Internet, , 2005, pp 430-436.
  • Y. Ohsita, S. Ata, and M. Murata, "Detecting Distributed Denial-of-Service Attacks by Analyzing TCP SYN Packets Statistically," Proceeding of the IEEE Communications Society Globecom, , 2004, pp. 2043-2049.
  • Babu BS, Venkataram. P "A dynamic authentication scheme for mobile transactions," International Journal on Network Security 2009, pp. 73-112.
  • X. Jin, Y. Zhang, Y. Pan, and Y. Zhou, "ZSBT: A novel algorithm for tracing DoS attackers in MANETs," EURASIP Journal on Wireless Communications and Networking, vol. 2006, pp 1-9.
  • S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network support for iptraceback," IEEE/ACM Trans. Networking. , vol. 9, June 2001, pp. 103-144.
  • Y. Kim and A. Helmy, "CATCH: A protocol framework for cross-layer attacker traceback in mobile multi-hop networks," presented at Ad Hoc Networks, 2010, pp. 193-213.
  • N. Nishanth and PallapaVenkatram, "Mobile agent based TCP Attacker Identification in MANET using the Traffic History (MAITH)," International Conference on Communication Technology, 2011, pp. 1130-1134.
  • Vasilios A. SirisyandFotiniPapagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks" , in Proc. Of IEEEGlobecom 2004 (Security and Network Management Symposium), Dallas, USA, November 2004, pp. 66-81.
  • Kunal Shah, "Performance analysis of mobile agents in wireless internet applications using simulation", 2003.
  • CERT Advisory CA-96. 21, TCP SYN Flooding and IP Spoofing Attacks, September 24, 1996, pp. 200-213.
  • Yongjin, V. Sankhla, and A. Helmy, "Efficient traceback of dos attacks using small worlds in manet," in 60th IEEE Vehicular Technology Conference, vol. 6, 2004, pp. 63-91.
  • A. Helmy, "Small World in Wireless networks," IEEE Communication Letters, vol. 7, No. 10, oct 2003, pp. 490-492.