Modeling and Detection of Flooding-Based Denial-of-Service Attack in Wireless Ad Hoc Network Using Bayesian Inference
Autor: | A. Mujeeb, N. Nishanth |
---|---|
Rok vydání: | 2021 |
Předmět: |
021103 operations research
Spoofing attack Computer Networks and Communications business.industry Computer science Wireless ad hoc network ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS 0211 other engineering and technologies Denial-of-service attack 02 engineering and technology Mobile ad hoc network Bayesian inference Computer Science Applications Flooding (computer networking) Network congestion Control and Systems Engineering Electrical and Electronic Engineering SYN flood business Information Systems Computer network |
Zdroj: | IEEE Systems Journal. 15:17-26 |
ISSN: | 2373-7816 1932-8184 |
DOI: | 10.1109/jsyst.2020.2984797 |
Popis: | Wireless ad hoc networks are widely useful in locations where the existing infrastructure is difficult to use, especially during the situations like flood, earthquakes, and other natural or man-made calamities. Lack of centralized management and absence of secure boundaries make these networks vulnerable to various types of attacks. Moreover, the mobile nodes used in these networks have limited computational capability, memory, and battery backup. Flooding-based denial-of-service (DoS) attack, which results in denial of sleep attack, targets the mobile node's constrained resources which results in excess consumption of battery backup. In SYN flooding-based DoS attack, the attacker sends a large number of spoofed SYN packets which not only overflow the target buffer but also creates network congestion. The present article is divided into three parts: 1) mathematical modeling for SYN traffic in the network using Bayesian inference; 2) proving the equivalence of Bayesian inference with exponential weighted moving average; and 3) developing an efficient algorithm for the detection of SYN flooding attack using Bayesian inference. Based on the comprehensive evaluation using mathematical modeling and simulation, the proposed method can successfully defend any type of flooding-based DoS attack in wireless ad hoc network with higher detection accuracy and extremely lower false detection rate. |
Databáze: | OpenAIRE |
Externí odkaz: |