CFP last date
20 June 2024
Reseach Article

Defense against DoS Attack using Monitoring Node

Published on May 2012 by Ann Mary Varghese, K. Selvaraj
National Conference on Advances in Computer Science and Applications (NCACSA 2012)
Foundation of Computer Science USA
NCACSA - Number 2
May 2012
Authors: Ann Mary Varghese, K. Selvaraj
ebac6ae3-5b74-4075-8a1a-aef174341755

Ann Mary Varghese, K. Selvaraj . Defense against DoS Attack using Monitoring Node. National Conference on Advances in Computer Science and Applications (NCACSA 2012). NCACSA, 2 (May 2012), 21-25.

@article{
author = { Ann Mary Varghese, K. Selvaraj },
title = { Defense against DoS Attack using Monitoring Node },
journal = { National Conference on Advances in Computer Science and Applications (NCACSA 2012) },
issue_date = { May 2012 },
volume = { NCACSA },
number = { 2 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 21-25 },
numpages = 5,
url = { /proceedings/ncacsa/number2/6487-1012/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%A Ann Mary Varghese
%A K. Selvaraj
%T Defense against DoS Attack using Monitoring Node
%J National Conference on Advances in Computer Science and Applications (NCACSA 2012)
%@ 0975-8887
%V NCACSA
%N 2
%P 21-25
%D 2012
%I International Journal of Computer Applications
Abstract

Consider a scenario where a sophisticated jammer jams an area in which a single-channel random access based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network and a notification message is transferred out of the jammed region. In this paper introduce a network defense policy node for monitoring the jammer in order to overcome from attack to network. The monitoring node misleads the jammer that the server is down but actually the server is not down. This paper provides valuable insights about the structure of the jamming problem and associated defense mechanisms for achieving desirable performance.

References
  1. A. D. Wood and J. A. Stankovic (2002), "Denial of Service in Sensor Networks," Computer, vol. 35, no. 10, pp. 54-62.
  2. A. M. Mathai (1999), "An Introduction to Geometrical Probability", Gordan and Breach Science Publishers.
  3. C. D. M. Cordeiro and D. P. Agrawal (2006),"Ad Hoc and Sensor Networks Theory and Applications. World Scientific.
  4. C. W. Helstrom(1995), Elements of Signal Detection and Estimation. Prentice-Hall.
  5. D. P. Bertsekas and R. G. Gallager(1992), Data Networks, second ed. Prentice Hall.
  6. G. Lin and G. Noubir, (2005)" On Link-Layer Denial of Service in Data Wireless LANs," Wiley J. Wireless Comm. And Mobile Computing, vol. 5 no. 3, pp 273-284.
  7. J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan(2004), "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy.
  8. J. M. McCune, E Shi, A. Perrig, and M. K. Reiter(2005), " Detection of Denial-of-Message Attacks on Sensor Networks Broadcasts," Proc. IEEE Symp. Security and Privacy.
  9. M. Cagalj, S. Capkun, and J. -P. Hubaux(2007), "Wormhole-Based Anti-Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp 1-15.
  10. M. Li, I. Koutsopoulos, and R. Poovendran(2007), " Optimal Jamming Attacks and Defense Policies in Wireless Sensor Networks," Proc. IEEE INFOCOM,.
  11. M. Raya, J. -P Hubaux, and I. Aad(2004), "DOMINO: A System to Detect Greedy Behavior in IEEE 802. 11 Hotspots," Proc. Second Int'l Conf. Mobile Systems, Applications and Services (MobiSys '04).
  12. P. Kyasanur and N. Vaidya(2005), "Selfish MAC Layer Misbehavior in Wireless Networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502-516.
  13. R. Mallik, R. Scholtz, and G. Papavassilopoulos(2000), "Analysis of an On-Off Jamming Situation as a Dynamic Game," IEEE Trans. Comm. , vol. 48, no. 8, pp. 1360-1373.
  14. R. Negi and A. Perrig(2003), "Jamming Analysis of MAC Protocols," Carnegie Mellon Technical Memo,.
  15. S. Radosavac, I. Koutsopoulos, and J. S. Baras(2005), "A Framework for MAC Protocol Misbehavior Detection in Wireless Networks," Proc. ACM Workshop Wireless Security (Wise).
  16. V. Coskun, E. Cayirci, A. Levi, and S. Sancak(2006), "Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 5, no. 8, pp. 1074-1086.
  17. V. P. Dragalin, A. G. Tartakovsky(1999), and V. V. Veeravalli, "Multihypothesis Sequential Probability Ratio Tests- Part 1: Asymptotic Optimality," IEEE Trans. Information Theory, vol. 45, no. 7, pp. 2448-2461.
  18. W. Xu, T. Wood, W. Trappe, and Y. Zhang(2007), "Channel Surfing: Defending Wireless Sensor Networks from Interference," Proc. IEEE Int'l Conf. Informtion Processing in Sensor Networks (IPSN),.
  19. W. Xu, W. Trappe, Y. Zhang, and T. Wood(2005), " The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHOC,.
  20. Y. W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga(2009), "Energy Efficient Link-Layer Jamming Attack Against Wireless Sensor Networks MAC Protocols," ACM Trans. Sensor Networks, vol. 5, no. 1, pp. 1-38.
Index Terms

Computer Science
Information Sciences

Keywords

Jamming Wireless Sensor Network Network Defense Policy Node Security Optimization