A Catechistic Method for Traffic Pattern Discovery in MANET



Similar documents
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Security for Ad Hoc Networks. Hang Zhao

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

SBSCET, Firozpur (Punjab), India

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Unit 3 - Advanced Internet Architectures

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

LIST OF FIGURES. Figure No. Caption Page No.

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Security Threats in Mobile Ad Hoc Networks

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc


QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Security in Ad Hoc Network

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Optimized Load Balancing Mechanism Using Carry Forward Distance

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

A Survey: High Speed TCP Variants in Wireless Networks

Analysis of IP Network for different Quality of Service

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Customer Specific Wireless Network Solutions Based on Standard IEEE

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

EFS: Enhanced FACES Protocol for Secure Routing In MANET

International Journal of Advanced Research in Computer Science and Software Engineering

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Study of Network Characteristics Incorporating Different Routing Protocols

Tema 5.- Seguridad. Problemas Soluciones

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

TOPOLOGIES NETWORK SECURITY SERVICES

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

IJMIE Volume 2, Issue 7 ISSN:

CHAPTER 1 INTRODUCTION

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Intrusion Detection for Mobile Ad Hoc Networks

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

International Journal of Advanced Research in Computer Science and Software Engineering

Implementing RSA Algorithm in MANET and Comparison with RSA Digital Signature Spinder Kaur 1, Harpreet Kaur 2

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Efficient Detection of Ddos Attacks by Entropy Variation

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Figure 1. The Example of ZigBee AODV Algorithm

Transcription:

A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer Science and Engineering, Karpagam University, Coimbatore. Abstract MANET is an open nature network where numerous anonymous communication taken place to disturb the network traffic. Many anonymity enhancing techniques is available to protect the communication, anonymity of mobile ad hoc networks (MANETs) based on packet encryption. Thus the paper shows that MANETs is still having the chance of easily affected by the passive statistical traffic analysis attacks. The Catechistic Method for Traffic Pattern Discovery in MANET is proposed which perform the passive attacks in the MANET network based on the statistical behavior of the traffic on the network.in addition, it discovers the real source nodes with the corresponding destination nodes and the intermediates. Empirical studies demonstrate that the proposed discovery system achieves good accuracy in finding the hidden traffic patterns which may cause disturbance to the MANET network. Keywords: MANET, Anonymous Communication, traffic analysis, Catechistic Method, Traffic pattern and passive attacks. I. INTRODUCTION A MANET is an independent accumulation of mobile users that connect over generally bandwidth obliged wireless links. Since the nodes in the MANET have high mobility, the topology of the network may change quickly and unusually when time changes. The network is decentralized; where all network action, including finding the network topology and transferring the messages between nodes must be executed by the nodes themselves. MANET has the Anonymous Communication is always been the big issue in its security. Hence it is not easy to find the destination, source node, the intermediate node and the path through which the message passes in the network. There are many MANET protocols and techniques are available in case of finding Anonymous Communication such as onion routing, which does the data encryption with multiple layers and helps to cover the node identity and the routing information from the unauthorized nodes.there are many attacks available for the wired network to analyze the traffic such as disclosure attack and predecessor attack (MariosIliofotou, et al., 2007). In case of MANET as a wireless, selfconfiguring and infrastructure less networks, these attacks are not suited effectively for analyzing the traffic due to the MANET characteristics such as broadcasting nature, adhoc nature, and mobile nature. Hence, in the existing system, the packet is treated as the pointto-point transmission between the receiver and the sender. A point-to-point traffic matrix is generated and then may extend to end-to-end 51

relation if needed. This leads to the efficient framework against MANET, but it left some important information regarding the communication pattern in the MANET network and also it does not provide an exact technique to find the destination and the source node in the network. A Catechisticmethod is introduced in the paper which discovers a traffic pattern and the information regarding the traffic pattern in the MANET network, which in turn it find the destination and source nodes by performing the passive attack. The Catechistic Method for Traffic Pattern Discovery in MANET is proposed which perform the passive attacks in the MANET network based on the statistical behavior of the traffic within the network. This method concentrates on the important characteristics of the MANET which was a disadvantage of the existing system and discovers the real source nodes with the corresponding destination nodes and the intermediates. The proposed method in MANET discovers the source node and the destination node and the corresponding relationship between them, which is not possible in case of existing systems. II. RELATED WORK MANET has the open nature and it can easily affect by several attacks. Distributed Denial of Service (DDoS) attack is the main problem in the MANET and it can able to produce large amount of traffic. Due the MANET complex environment, it is difficult to find this attack. Hence the paper (M.Yasodha, et al., 2014) introduces the Reactive Defense Mechanism which is an analytic technique to reduce the DDoS attack. This mechanism improves the performance of the network along with the reducing packet drop and delay. Many simulations are done in this paper to prove that the proposed method is efficient in reducing the DDoS attack. The analysis of traffic patterns and discovering the correct one is a critical issue in the MANET due to its three major characteristics. Many protocols and techniques are proposed to analyze the traffic in MANET. But the paper (Yunzhong Liu, et al., 2010) proposes the traffic inference algorithm which makes the passive global adversary to network and find the traffic pattern accurately. This algorithm is examined in various environments and proves the result that it shows better efficient in finding the traffic pattern and in the future, the cross layer design is needed to analyze the traffic in a better way. The MANET consists of autonomous nodes, which can move dynamically and does not need any infrastructure. This type of network is used in many real time scenarios such as rescue operations, military services, conferences, sensor networks, etc. hence MANET has come over many routing protocols, issues, security policies and the merits and demerits etc. this paper (MeenakshiYadav and NishaUparosiya, 2014) makes a review of all these thing involving in the MANET network. The networks are not always connected in between the source and destination. There is a chance of some failure in device, path, and transmission range and so on. This makes the source not to communicate properly with the destination. The author (S.Jeevitha and P.Damodharan, 2014) attempts to provide communication in the network using the prediction based routing, which find the intermediate node utilizing the history of the network. In addition, the time of node commitment and the arrival time of the node in the particular place are found by using the Time- Homogeneous Semi-Markov process model (TH- SMP) which improves the message delivery than the existing routing methods. Network monitoring is a big issue in any network and many monitoring protocols and method are 52

introduced to resolve this issue, but still somewhere the problem creates some damage to the network. The paper (OlatundeAbiona, et al., 2009) introduces the architecture for network monitoring and analyzing which utilizes the gigabit interface to capture the network traffic and the traffic analysis is done using the Multi Router Traffic Grapher (MRTG). The early network monitoring tries to preserve the data and observe similar traffic patterns even in the unrelated places in the network. The paper (SambuddhoChakravarty, et, al., 2014) reviews the active traffic analysis method according to the user behavior in the network and attains the similar behavior in both the client and server side through observed similarity. This method is examined using the lab testing and also in the real time scenario. This method is capable of obtaining the real source and destination in the blurred traffic. The broadcasting addresses are set to 1 that safeguard against the point to point communication path discovery The routing and the traffic pattern information are revealed Addition information and the packets are included in the network since the MANET have constrained resources Rules for attackers to passive attack The attacker always wants to discover the traffic patterns in the network. But it is difficult for the attacker to analysis the traffic pattern in the MANET network because of the three main characteristics such as mobility, broadcast and ad-hoc. The proposed system uses the statistical traffic analysis approach which enables the model to analyze the traffic in MANET. III. PRELIMINARIES Steps in Communication Model The existing systems are always generated with the aim of providing security levels for the MANET network. But the proposed system has concentrated on the analyzing the statistical information of the traffic in the MANET. The communication process follows the following steps. The physical/mac layer is controlled by and connected to the network standard protocols and the packets (data) are protected in terms of encryption, hence the attacker cannot able to read the packet Padding is the process of making the packets all equal size. Hence padding is done to all the packets through which the attackers cannot able to track an individual packet due to the unique size Figure 1. Three possibilities of attacks in MANET Initially the attacker must join the network and then do the passive attack. The attacker has the three possibilities to find the traffic information (R. Arunkumar, et al., 2014). (1) First, it can attack the source and get the packet to find the traffic information. (2) Second option is to attack the intermediate node and get the traffic 53

information or (3) the third option is to attack the destination node and get the traffic information. IV. CATECHISTIC METHOD FOR TRAFFIC PATTERN DISCOVERY The proposed system is having two main steps in, revealing the traffic pattern in MANET. Initially the sequence of point-to-point traffic matrices is generated using the observed traffic and then the end-to-end traffic matrixes are derived from the point-to-point traffic matrices. As depicted in the figure 2, consider three mobile nodes, namely A, B, C and the node A is in the transmission range of node B; node B is in the transmission range of node A and C; then the node C is in the transmission range of node C but not node A. In case the node A wants to send data packet to node C, then the it has the only way that is it has to pass via node B. Without the node is in the transmission range of another node, then the communication is not possible between those nodes. Our proposed system makes use of TCP protocol which does proper connection establishment and the robust connection between any nodes in the network. Initially the server waits for the client to send request for communication and once the connection is established, the instance of class is given to both the client and server. Both the input and output streams are observed for every instance of class and the communication is done through these instances. To send the packet data, the client (any node which wants to send data) have to get the instance of the client socket from the client and in order to get the data packets from the client, the instance of the server socket from the server is generated. Traffic Matrices Construction and Traffic Pattern Discovery First the point-to-point traffic matrix is constructed using the observed point-to-point traffic within the certain period.point-to-point traffic means the traffic analysis between two nodes. They may be a source and intermediate nodes, intermediate and destination node or between two intermediate nodes. Combining these sequences of point-to-point matrixes, the end-to-end matrixes are derived which includes both the point-to-point traffic and the multi hop traffic. Finally, with the revealed end-to-end matrix, the traffic information between each pair of nodes are obtained and proceed another investigation to that find the original source and destination nodes using the source/destination probability distribution and the end-to-end link probability distribution. V. PERFORMANCE ANALYSIS The performance analysis is done through demonstration of attacks in the proposed model from which we can able to find the source node, destination node and the other intermediate nodes used for the communication and through evaluating the proposed system performance. Demonstration Consider the MANET network consisting of six nodes and an attacker node in addition. The communication is held between any two nodes or between any nodes with many intermediates nodes. This is done via server and client socket instances. The attacker node joins the network and works passively as described in the figure 1. The data transmission is done through any other nodes and the attacker is not aware of the communication. Hence the attacker attacks any node in the MANET and done passive attack to trace the traffic pattern and information. Then finally the information about the source, destination and intermediate nodes address are collected using the proposed system. Evaluation 54

Comparing with the previous methods and approaches used for the identifying the traffic pattern of a MANET, the proposed Catechistic Method for Traffic Pattern Discovery in MANET provide better clarity of discovering the original source, destination and intermediate nodes of the data transmission. Various methods are available for discovering the traffic patterns of the MANET by knowing either the source or the destination or any one of the intermediate nodes. But it is difficult to find the traffic information without knowing the source or destination or any of the intermediate nodes because of the three major characteristics of the MANET. Hence we conclude that the proposed method suits better for the discovering the traffic pattern in good accuracy without knowing the source or destination or any of the intermediate nodes. VI. CONCLUSION The paper proposed the Catechistic Method for Traffic Pattern Discovery in MANET which works passively in the MANET and presented as an attacking system in MANET which identified the traffic patterns of the data transmission. This method just takes the data packets from the MAC layer to trace the traffic of the network. By using the proposed method, the packets are analyzed and identify the traffic patterns. The extension of this method is leads to monitor the devices used in the defense and military for the exact location identification of the source and destination devices. REFERENCES [1] MariosIliofotou, PrashanthPappu and MichalisFaloutsos, Network Monitoring using Traffic Dispersion Graphs (TDGs), Proceeding of the 7 th ACM SIGCOMM Conference on Internet Measurement, pp. 315-320, ISBN: 978-1-59593-908-1, 2007. [2] M.Yasodha, S.Umarani, D.Sharmila, Detecting and Preventing the Packet for Trace Back Ddos Attack in Mobile Ad-Hoc Network, Journal of Recent Research in Engineering and Technology, Volume 1 Issue 6, ISSN (Print):2349 2260, Oct 2014. [3] Yunzhong Liu, Rui Zhang, Jing Shi, and Yanchao Zhang, Traffic Inference in Anonymous MANETs, 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), ISBN: 4244-7151, IEEE, 2010. Figure 2. The Probability of data transferring between nodes at time [4] MeenakshiYadav and NishaUparosiya, Survey on MANET: Routing Protocols, Advantages, Problems and Security, International Journal of Innovative Computer Science & Engineering, Volume 1 Issue 2; Page No. 12-17, 2014. 55

[5] S.Jeevitha and P.Damodharan, Routing using History Information in Disruption Tolerant Network, Journal of Recent Research in Engineering and Technology, Volume 1 Issue 1, ISSN (Print): 2349 2260, May 2014. [6] O. Abiona, T. Aladesanmi, C. Onime, A. Oluwaranti, A. Oluwatope, O. Adewara, T. Anjali and L. Kehinde, "A Scalable Architecture for Network Traffic Monitoring and Analysis Using Free Open Source Software," Int'l J. of Communications, Network and System Sciences, Vol. 2 No. 6, pp. 528-539, 2009. [7] SambuddhoChakravarty, Marco V. Barbera and GeorgiosPortokalidis, On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records, 15th International Conferenceon Passive and Active Measurement, PAM 2014, Los Angeles, CA, USA, ISBN: 978-3-319-04917-5, March 10-11, 2014. [8] Arunkumar R, Bharateshhegde, Ganeshprasad, Manoj C Jagatap and Vishwas S, MTPD: Manet Traffic Pattern Discovery A Heuristic Approach, International Journal of Advanced Technology in Engineering and Science, Volume No.02, Issue No. 06, ISSN (online): 2348 7550, June 2014. 56