Browse > Article

A Study on DDoS Attack Mitigation Technique in MANET  

Yang, Hwan-Seok (중부대학교 정보보호학과)
Yoo, Seung-Jae (중부대학교 정보보호학과)
Publication Information
Abstract
MANET composed wireless nodes without fixed infrastructure provides high flexibility, but it has weak disadvantage to various attack. It has big weakness to DDoS attack because every node perform packet forwarding especially. In this paper, packet transmission information control technique is proposed to reduce damage of DDoS attack in MANET and search location of attacker when DDoS attacks occur. Hierarchical structure using gateway node is adopted for protect a target of attack in this study. Gateway node in cluster is included like destination nodes surely when source nodes route path to destination nodes and it protects destination nodes. We confirmed efficiency by comparing proposed method in this study with CUSUM and measured the quantity consumed memory of cluster head to evaluate efficiency of information control using to location tracing.
Keywords
Attack Mitigation; DDoS; MANET;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Zhou and Z. Haas, Securing Ad Hoc Networks, IEEE Network Magazine Vol. 13 No. 6, pp.24-30, 1999.   DOI   ScienceOn
2 M. Caralho, "Security in Mobile Ad Hoc Networks," IEEE Security & Privacy, March/April 2008.
3 I. Aad, J. P. Hubaux, E. W. Knightly, " Impact of Denial of Service Attacks in MANETs" IEEE/ACM Transactions on Networking(TON), vol. 16(4), pp. 791-802, 2008.   DOI
4 Y. Liu and L. Shen, "Defense of DoS Attack Focusing on Protecting Resource in Mobile Ad Hoc Networks," Computer knowledge and Technology 2007 3(16), 2007.
5 S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting distributed denial of Service (DDoS) attackts through inductive learning," In Proceedings of the 4th International Conference on Intelligent Data Engineering and Automated Learning(IDEAL'03), pp. 286-295, Mar. 2003.
6 H. Burch, "Tracing anonymous packets to their approximate source," In Proceedings of the 14th USENIX Conference on System Administration, pp. 319-328, Dec. 2000.
7 S. Savage, D. Wetherall, A. Karlin, and T. Anderson,"Practical network support for IP traceback," ACM SIGCOMM Computer Communications Review, vol. 30, no. 4, pp. 295-306, Aug. 2000.   DOI   ScienceOn