DOI QR코드

DOI QR Code

A Study on Multi-level Attack Detection Technique based on Profile Table

프로파일 기반 다단계 공격 탐지 기법에 관한 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2014.11.02
  • Accepted : 2014.11.17
  • Published : 2014.12.30

Abstract

MANET has been applied to a wide variety of areas because it has advantages which can build a network quickly in a difficult situation to build a network. However, it is become a victim of malicious nodes because of characteristics such as mobility of nodes consisting MANET, limited resources, and the wireless network. Therefore, it is required to lightweight attack detection technique which can accurately detect attack without causing a large burden to the mobile node. In this paper, we propose a multistage attack detection techniques that attack detection takes place in routing phase and data transfer phase in order to increase the accuracy of attack detection. The proposed attack detection technique is composed of four modules at each stage in order to perform accurate attack detection. Flooding attack and packet discard or modify attacks is detected in the routing phase, and whether the attack by modification of data is detected in the data transfer phase. We assume that nodes have a public key and a private key in pairs in this paper.

Keywords

References

  1. Zhou, L. and Haas, Z. J., "Securing ad hoc networks," IEEE Network, 2008, Vol. 13, Issue 6, pp. 24-30.
  2. A. Agah, S. Das, K. Basu, and M. Asadi, "Intrusion detection in sensor networks : A non-cooperative game approach," in 3rd IEEE International Symposium on Network Computing andApplications, (NCA 2004), Boston, MA, August 2004, pp. 343-346.
  3. 신대철, 김홍윤, "침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 125-137.
  4. A. Hasswa, M. Zulker, and H. Hassanein, "Routeguard: an intrusion detection and response system for mobile ad hoc networks," Wireless And Mobile Computing, Networking And Communication, 2005, Vol. 3, pp. 336-343.
  5. V. Bhuse, A. Gupta, "Anomaly intrusion detection in wireless sensor network," Journal of High Speed Networks, 2006, Vol. 15, Issue 1, pp. 33-51.
  6. Shakshuki, E., Kang, N., Sheltami, T., "EAACK - A Secure Intrusion Detection System for MANETs," IEEE Transactions on Industrial Electronics, 2013, Vol. 60, No. 1, pp. 1089-1098. https://doi.org/10.1109/TIE.2012.2196010
  7. 최희식, 박재표, 전문석, "SIP 플러딩 탐지 차단실험방법에 대한 연구," 디지털산업정보학회지, 제7권, 제2호, 2011, pp. 39-46.
  8. D. R. Raymond and S. F. Midkif, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, 2008, Vol. 7, No. 1, pp. 74-81. https://doi.org/10.1109/MPRV.2008.6
  9. Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Marimuthu Palaniswami. Intrusion Detection for Routing Attacks in Sensor Networks, International Journal of Distributed Sensor Networks, 2006, Vol. 2, Issue 4, pp. 313-332. https://doi.org/10.1080/15501320600692044
  10. Al-Roubaiey, A. Sheltami, T., Mahmoud, A., Shakshuki, E., Mouftah, H., "AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement," Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, Vol. 3, No. 1, pp. 634-640.