Defending against Flood Attacks in Disruption Tolerant Networks

Similar documents
Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

A Catechistic Method for Traffic Pattern Discovery in MANET

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Wireless Sensor Networks Chapter 14: Security in WSNs

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Efficient File Sharing Scheme in Mobile Adhoc Network

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Intrusion Detection for Mobile Ad Hoc Networks

Professor & Dean (Academic), Department of CSE, Kongunadu College of Engineering and Technology, Tamil Nadu, India.

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

A Security Architecture for. Wireless Sensor Networks Environmental

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Backpressure with Adaptive Redundancy Mechanism for Networks in Overload

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Technology Longowal, Punjab, India

A Novel Packet Marketing Method in DDoS Attack Detection

Security Enhanced Cooperative Game Theory for Mobile Ad-Hoc Network

Opportunistic Content Distribution in an Urban Setting

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Problems of Security in Ad Hoc Sensor Network

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

CHAPTER 1 INTRODUCTION

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Vampire Attack Detecting and Preventing in Wireless Sensor Network

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Securing MANET Using Diffie Hellman Digital Signature Scheme

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A Dynamic Reputation Management System for Mobile Ad Hoc Networks

Keywords Attack model, DDoS, Host Scan, Port Scan

DDoS Overview and Incident Response Guide. July 2014

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Toward Secure Network Coding in Wireless Networks: Threats and Challenges

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Introduction to Wireless Sensor Network Security

Single Sign-On Secure Authentication Password Mechanism

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

External Supplier Control Requirements

2. Design. 2.1 Secure Overlay Services (SOS) IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.

SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks

Monitoring Performances of Quality of Service in Cloud with System of Systems

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

ISSN: (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

INTRUSION DETECTION ON CLOUD APPLICATIONS

DETECTING MALICIOUS PACKET DROPPING AND SECURE TRACE OUT IN WIRELESS AD-HOC NETWORK

Moni4VDTN: a Monitoring System for Vehicular Delay-Tolerant Networks

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Security in Ad Hoc Network

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

International Journal of Advanced Research in Computer Science and Software Engineering

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

A Protocol Based Packet Sniffer

Denial of Service Attacks and Resilient Overlay Networks

A SIP based VOIP to avoid Vulnerabilities in designing VOIP network in Enterprise

Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 27 th March 2015

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Efficient Detection of Ddos Attacks by Entropy Variation

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet

Complete Protection against Evolving DDoS Threats

Detection and mitigation of Web Services Attacks using Markov Model

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Multi-Channel DDOS Attack Detection & Prevention for Effective Resource Sharing in Cloud

Network analysis for context and content oriented wireless networking

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

How To Prevent A Malicious Node From Attacking Manet With A Ddos Attack

Protocol Design for Neighbor Discovery in AD-HOC Network

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

SECURITY ISSUES: THE BIG CHALLENGE IN MANET

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

Transcription:

Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014, pg.511 516 RESEARCH ARTICLE ISSN 2320 088X Defending against Flood Attacks in Disruption Tolerant Networks Gayatri Rani, B.Tech, (M.Tech), K Santosh Kumar, B.Tech, M.Tech Computer Science and Engineering, Computer Science and Engineering, JNTU, Hyderabad, India k.gayatri.r@gmail.com ABSTRACT- Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In this paper, we employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit over the number of packets that it can generate in each time interval and a limit over the number of replicas that it can generate for each packet. We propose a distributed scheme to detect if a node has violated its rate limits. To address the challenge that it is difficult to count all the packets or replicas sent by a node due to lack of communication infrastructure, our detection adopts claim-carry-and check: each node itself counts the number of packets or replicas that it has sent and claims the count to other nodes; the receiving nodes carry the claims when they move, and cross-check if their carried claims are inconsistent when they contact. The claim structure uses the pigeonhole principle to guarantee that an attacker will make inconsistent claims which may lead to detection. We provide rigorous analysis on the probability of detection, and evaluate the effectiveness and efficiency of our scheme with extensive trace driven simulations. I. INTRODUCTION Disruption Tolerant Networks (DTNs) consist of mobile nodes carried by human beings, vehicles, etc. DTNs enable data transfer when mobile nodes are only intermittently connected, making them appropriate for applications where no communication infrastructure is available such as military scenarios and rural areas. Due to lack of consistent connectivity, two nodes can only exchange data when they move into the transmission range of each other (which is called a contact between them). DTNs employ such contact opportunity for data forwarding with store-carry-and-forward ; i.e., when a node receives some packets, it stores these packets in its buffer, carries them around until it contacts another node, and then forwards them. Since the contacts between nodes are opportunistic and the duration of a contact may be short because of mobility, the usable bandwidth which is only available during the opportunistic contacts is a limited resource. Also, mobile nodes may have limited buffer space. Due to the limitation in bandwidth and buffer space, DTNs are vulnerable to flood attacks. In flood attacks, maliciously or selfishly motivated attackers inject as many packets as possible into the network, 2014, IJCSMC All Rights Reserved 511

or instead of injecting different packets the attackers forward replicas of the same packet to as many nodes as possible. Moreover, mobile nodes spend much energy on transmitting/receiving flooded packets and replicas which may shorten their battery life. Although many schemes have been proposed to defend against flood attacks on the Internet and in wireless sensor networks, they assume persistent connectivity and cannot be directly applied to DTNs that have intermittent connectivity. We noted that the packets flooded by outsider attackers (i.e., the attackers without valid cryptographic credentials) can be easily filtered with authentication techniques. However, authentication alone does not work when insider attackers (i.e., the attackers with valid cryptographic credentials) flood packets and replicas with valid signatures. Thus, it is still an open problem is to address flood attacks in DTNs. II. LITERATURE SURVEY The dawn of new and cheap wireless networking solutions has created opportunities for networking in new situations, and for exciting new applications that use the network. With techniques such as IEEE 802.11, Bluetooth, and other radio solutions it has become viable to equip almost any device with wireless networking capabilities. Due to the ubiquity of such networking enabled devices, situations where communication is desirable can occur at any time and any place, even where no networking infrastructure is available. [1].In an ad hoc network, all nodes participate in the routing and forwarding of packets, so if two nodes cannot communicate directly, intermediate nodes aid in forwarding the packet between them. One of the most basic requirements for traditional networking, which also holds for ad hoc networking, is that there must exist a fully connected path between communication end points for communications to be possible. There are however a number of scenarios where this is not the case but where it still is desirable to allow communication between nodes. Such scenarios include communication between villages and summer camps of the Saami population of reindeer herders in the north of Sweden [2].living in locations where no fixed infrastructure is available. Similar problems exist between rural villages in India and other poor regions. [3].Other fields where this kind of communication scenarios may occur are satellite communication, military and disaster recovery operations, sensor networking and monitoring. For example, experiments have been done with attaching sensors to seals. III. EXISTING SYSTEM DTNs employ such contact opportunity for data forwarding with store-carry-and-forward ; i.e., when a node receives some packets, it stores these packets in its buffer, carries them around until it contacts another node, and then forwards them. Since the contacts between nodes are opportunistic and the duration of a contact may be short because of mobility, the usable bandwidth which is only available during the opportunistic contacts is a limited resource. Also, mobile nodes may have limited buffer space. Due to the limitation in bandwidth and buffer space, DTNs are vulnerable to flood attacks. In flood attacks, maliciously or selfishly motivated attackers inject as many packets as possible into the network, or instead of injecting different packets the attackers forward replicas of the same packet to as many nodes as possible. For convenience, we call the two types of attack packet flood attack and replica flood attack, respectively. 2014, IJCSMC All Rights Reserved 512

Problem Definition: We consider a scenario where each node has a rate limit L on the number of unique packets that it as a source can generate and send into the network within each time interval T. The time intervals start from time 0, T, 2T, etc. The packets generated within the rate limit are deemed legitimate, but the packets generated beyond the limit are deemed flooded by this node. To defend against packet flood attacks, our goal is to detect if a node as a source has generated and sent more unique packets into the network than its rate limit L per time interval. Drawbacks: 1. Selfishly motivated attackers inject as many packets as possible into the network. 2 Bandwidth and buffer space, DTNs are vulnerable to flood attacks. 3 DTN s follows store-carry-and-forward. 4 Attacks generated in DTN s are the two types of attack packet flood attack and replica flood attack. IV. OBJECTIVES The objective of this sub-project is to develop tools and methods to support the earlier phases of systems development; for implementation independent specification and verification, and for subsequent synthesis of specifications into efficient implementations. The sub-project is divided into four sub-tasks: adopt/further develop a model for formal, high-level system specification and verification. Demonstrate the efficacy of the developed model by applying it to a suitable part of the consortium demonstrator, the network terminal for broadband access. Develop a systematic method to refine the specification into synthesizable code and a prototype tool which supports the refinement process and links it to synthesis and compilation tools. V. PROPOSED SYSTEM In this paper, we employ rate limiting to defend against flood attacks in DTNs. In our approach, each node has a limit over the number of packets that it, as a source node, can send to the network in each time interval. Each node also has a limit over the number of replicas that it can generate for each packet. The two limits are used to mitigate packet flood and replica flood attacks, respectively. If a node violates its rate limits, it will be detected and its data traffic will be filtered. In this way, the amount of flooded traffic can be controlled. Our main contribution is a technique to detect if a node has violated its rate limits. Our basic idea of detection is claim carry-and-check. Advantages: 1. Our main goal is a technique to detect if a node has violated its rate limit 2. The two types of attack packet flood attack and replica flood attack are detected. 3. In Proposed System DTNS follows claim-carry-and-check. 2014, IJCSMC All Rights Reserved 513

VI. SYSTEM ANALYSIS FEASIBILITY STUDY Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Technical Feasibility Operational Feasibility Economical Feasibility 6.1 ECONOMIC FEASIBILITY A system can be developed technically and that will be used if installed must still be a good investment for the organization. In the economical feasibility, the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs. The system is economically feasible. It does not require any addition hardware or software. Since the interface for this system is developed using the existing resources and technologies available at NIC, There is nominal expenditure and economical feasibility for certain. 6.2 OPERATIONAL FEASIBILITY Proposed projects are beneficial only if they can be turned out into information system. That will meet the organization s operating requirements. Operational feasibility aspects of the project are to be taken as an important part of the project implementation. Some of the important issues raised are to test the operational feasibility of a project includes the following: - Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented? Will there be any resistance from the user that will undermine the possible application benefits? This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the management issues and user requirements have been taken into consideration. So there is no question of resistance from the users that can undermine the possible application benefits. The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status. 2014, IJCSMC All Rights Reserved 514

6.3 TECHNICAL FEASIBILITY The technical issue usually raised during the feasibility stage of the investigation includes the following: Does the necessary technology exist to do what is suggested? Do the proposed equipments have the technical capacity to hold the data required to use the new system? Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? Can the system be upgraded if developed? Are there technical guarantees of accuracy, reliability, ease of access and data security? Earlier no system existed to cater to the needs of Secure Infrastructure Implementation System. The current system developed is technically feasible. It is a web based user interface for audit workflow at NIC- CSD. Thus it provides an easy access to the users. The database s purpose is to create, establish and maintain a workflow among various entities in order to facilitate all concerned users in their various capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it provides the technical guarantee of accuracy, reliability and security. The software and hard requirements for the development of this project are not many and are already available in-house at NIC or are available as free as open source. The work for the project is done with the current equipment and existing software technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number of users using the system. VII. CONCLUSION In this paper, we employed rate limiting to mitigate flood attacks in DTNs, and proposed a scheme which exploits claim-carry-and-check to probabilistically detect the violation of rate limit in DTN environments. Our scheme uses efficient constructions to keep the computation, communication and storage cost low. Also, we analyzed the lower bound and upper bound of detection probability. Extensive trace-driven simulations showed that our scheme is effective to detect flood attacks and it achieves such effectiveness in an efficient way. Our scheme works in a distributed manner, not relying on any online central authority or infrastructure, which well fits the environment of DTNs. Besides, it can tolerate a small number of attackers to collude. REFERENCES [1] K. Fall, A Delay-Tolerant Network Architecture for Challenged Internets, Proc. ACM SIGCOMM, pp. 27-34, 2003. [2] P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot, Pocket Switched Networks and Human Mobility in Conference Environments, Proc. ACM SIGCOMM, 2005. [3] M. Motani, V. Srinivasan, and P. Nuggehalli, PeopleNet: Engineering a Wireless Virtual Social Network, Proc. MobiCom, pp. 243-257, 2005. [4] J. Burgess, B. Gallagher, D. Jensen, and B. Levine, Maxprop: Routing for Vehicle-Based Disruption- Tolerant Networks, Proc. IEEE INFOCOM, 2006. 2014, IJCSMC All Rights Reserved 515

[5] S.J.T.U.Grid Computing Center, Shanghai Taxi Trace Data, http://wirelesslab.sjtu.edu.cn/, 2012. [6] J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, 2005. [7] C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Proc. IEEE First Int l Workshop Sensor Network Protocols and Applications, 2003. [8] E. Daly and M. Haahr, Social Network Analysis for Routing in Disconnected Delay Tolerant MANETs, Proc. MobiHoc, pp. 32-40,2007. [9] W. Gao, Q. Li, B. Zhao, and G. Cao, Multicasting in Delay Tolerant Networks: A Social Network Perspective, Proc. ACM MobiHoc, 2009. [10] F. Li, A. Srinivasan, and J. Wu, Thwarting Blackhole Attacks in Distruption-Tolerant Networks Using Encounter Tickets, Proc.IEEE INFOCOM, 2009. 2014, IJCSMC All Rights Reserved 516