Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks



Similar documents
DETECTION AND PREVENTION OF DDOS ATTACK IN MANET S USING DISABLE IP BROADCAST TECHNIQUE

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

How To Prevent A Malicious Node From Attacking Manet With A Ddos Attack

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CHAPTER 1 INTRODUCTION

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

How To Write A Transport Layer Protocol For Wireless Networks

Security in Ad Hoc Network

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Wireless Sensor Networks Chapter 14: Security in WSNs

Prediction of DDoS Attack Scheme

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Truth of D-DoS Attacks in MANET

Performance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks

International Journal of Advanced Research in Computer Science and Software Engineering

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

Security Threats in Mobile Ad Hoc Networks

SBSCET, Firozpur (Punjab), India

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Reduce flooding based DDoS attack and improve network performance parameters by using NS-2 Simulator

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Security for Ad Hoc Networks. Hang Zhao

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Survey on DDoS Attack Detection and Prevention in Cloud

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

A Catechistic Method for Traffic Pattern Discovery in MANET

A Novel Defense Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Securing MANET Using Diffie Hellman Digital Signature Scheme

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

IJMIE Volume 2, Issue 7 ISSN:

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Denial of Service in Sensor Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol

Introduction to Wireless Sensor Network Security

PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL

A Dynamic Reputation Management System for Mobile Ad Hoc Networks

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Adaptive DCF of MAC for VoIP services using IEEE networks

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

DoS: Attack and Defense

MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY

Performance Evaluation of Wired and Wireless Local Area Networks

Metrics for Detection of DDoS Attacks

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

The Monitoring of Ad Hoc Networks Based on Routing

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Simulation Based Analysis of VOIP over MANET

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

An Integrated Defense Approach for Distributed Denial of Service Attacks In Mobile Ad-Hoc Network

Optimized Load Balancing Mechanism Using Carry Forward Distance


A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Transcription:

Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology, Hisar INDIA # Email : yogeshchaba@yahoo.com Abstract : In Mobile Adhoc Networks (MANET), various types of Denial of Service s (DoS) are possible because of the inherent limitations of its routing protocols. A distributed denial-of-service (DDoS) attack is a DoS attack which relies on multiple compromised hosts in the network to attack the victim. In this paper impact of and based Passive DDoS attack is evaluated by finding the packet delivery ratio, energy consumption and collisions by varying node mobility and number of attackers. Experiments are performed by implementing both types of attacks through simulation. It is found that the selfish node attack has more impact on network performance than packet dropping attack. Keywords:- DoS, DDoS, PDDoS, MANET, PDR,, Mobility 1 Introduction Mobile adhoc networks have properties that increase their vulnerability to attacks. Unreliable wireless links are vulnerable to jamming and their inherent broadcast nature, facilitate eavesdropping. Constraints in bandwidth, computing power and battery power in mobile devices can lead to application-specific tradeoffs between security and resource consumption of the device. By diverting the traffic towards or away from a node, incorrect forwarding, no forwarding at all, or other non-cooperative behavior, nodes can attack the network [1]. s in MANETs do not have any central base station to coordinate the transmission and authentication of packets so the delivery of data packets from source to destination nodes in the network is dependent on the cooperation of the (intermediate) nodes in the network [2]. In Mobile Adhoc Networks (MANETs) various types of Denial of Service s (DoS) are also possible because of the inherent limitations of its routing protocols. A denial-of-service (DoS) attack always attempts to stop the victim from serving legitimate users [3]. A distributed denial-of-service (DDoS) attack is a DoS attack which relies on multiple compromised hosts in the network to attack the victim. There are two types of DDoS attacks i.e. passive and active DDoS attacks. The First type of DDoS attack has the aim of attacking the victim node in order to drop some or all of the data packets sent to it for further forwarding even when no congestion occurs, which is known as Passive DDoS attack. The second type of DDoS attack is based on a huge volume of attack traffic, which is known as an Active DDoS attack [4]. One type of passive DoS attacks is selfish node attack in which node does not participate in network operation and it discard some or all of data packets sent to it without handling them properly even when no congestion occur [5]. Due to various new type of attacks security is becoming an important concept in MANET nowadays. Existing work relating to security measures in MANETs typically address the issue of malicious nodes in the network. Lin et. al. [6] presents a hardware based cache scheme to detect selfish nodes in mobile adhoc network, by monitoring the activities of the upper layer software and reports the misbehavior about the software to other mobile nodes in the network. But practically this implementation is difficult and has computing overheads. Miran et.al. [7] outlined a selfishness prevention protocol for Open MANETs. By using just one message that is periodically broadcasted by every node, it does not introduce a substantial overhead on the network or in the nodes. This work is on its early stages of development and requires experimentation evaluation over a network simulator, with different topologies and node movements. Balakrishnan et al. [8] describe the Drop as a serious threat to ISSN: 179-5117 49 ISBN: 978-96-474-155-7

operational mobile adhoc networks. They proposed a defense-in-depth strategy to secure mobile adhoc networks. Saraeian et.al. [9] have evaluated the performance of AODV Protocol under DDoS s in MANET. They defined AODV as most vulnerable protocol and the results shows that this type of attacks has high effect on such networks. Denko [1] has proposed Detection and Prevention of Denial of Service (DoS) s in mobile adhoc networks using Reputation-Based Incentive Scheme. Boppana et.al.[11] have evaluated a Statistical Technique to Mitigate Malicious Control s in adhoc networks and DoS attacks that exploit flooding of control packets cause severe performance degradation. Intrusion Detection of s in mobile adhoc networks has been investigated and examined how esom performs in classifying normal and abnormal behavior in mobile adhoc networks. But they did not proposed any prevention technique against the selfish node. Most of the research work proposes protocols to detect and avoid passive distributed denial of service attack without differentiating whether attack is packet dropping or selfish node attack. Few research papers uses the term packet dropping and selfishness attack as synonym. In this paper impact of and based Passive DDoS attack is evaluated separately by finding the packet delivery ratio, energy consumption and collisions by varying node mobility and number of attackers. Experiments are performed by implementing both types of attacks through simulation. The rest of the paper is organized as follows. The next section discusses the implementation of and Passive Distributed DoS Mechanism. Section III explains simulation scenario for evaluation of both types of passive distributed DoS attack. Section IV discusses results of impact of and based Passive DDoS attack. Finally conclusion is given in Section V. 2 Implementation of PDDOS Mechanism Passive Distributed Denial of Service attack is of two types : 2.1 Based PDDoS Mechanism: In packet dropping attack a node drops some or all of the data packets sent to it for further forwarding even when no congestion occur. An adversary can easily join the network or capture a mobile node and then start to disrupt network communication by silently dropping packets. Network congestion control mechanisms do not apply here since packets are not dropped due to congestion. Link layer acknowledgment, such as IEEE 82.11 MAC protocol, can detect link layer break, but cannot detect forwarding level break. Although upper layer acknowledgment, such as TCP ACK, allows for detecting end-to end communication break, it can be inefficient and it does not indicate the node at which the communication breaks. Moreover such mechanism is not available in connectionless transport layer protocols, such as UDP. can be evaluated by monitoring the statistics FP (Forward Percentage) over a sufficiently long time period (T) by following formula: s actually forwarded FPm = s to be forwarded FP determines the ratio of forwarded packets over the packets that are transmitted to m node and that m should forward. If the denominator is not zero and FP i =, the attack is detected as Unconditional and m is identified as the attacker[11] Code for implementing attack is shown as shown below : if ((((node->nodeaddr)%5)==) && (node ->nodeaddr<= 7)) { drop(node); return; } This code is placed in different functions of aodv.pc file in simulator. Code above implements packet dropping attack by making node,5,1,.,7 as malicious. These nodes drop some or all data packets transmitted to it for further forwarding. 2.2 Based PDDoS Mechanism: In selfish node attack, the attacker do not participate in network operation even without congestion, which results neighbors node broadcasting packets again and again to this node. node is not serving as a relay to other nodes which are participating in the network. For instance, selfish nodes do not even send any HELLO messages and drop all packets even if they are sent to it. The victim will be out of service for legitimate traffic because selfish node is not responding at all. For attacks which target the bandwidth of the victim, the architecture of the victim network decides how large a volume of attack traffic is needed. Increasing the bandwidth of links and erasing bottleneck links in its own network can increase the ISSN: 179-5117 5 ISBN: 978-96-474-155-7

ability of a victim to tolerate selfish-based attacks [6]. Detection of selfish node attack can be done by monitoring the statistics LFP (Local Forward Percentage) over a sufficiently long time period L for each source s as is calculated below: s actually forwarded LFPsm = s to be forwarded If the denominator is not zero and the statistics is zero, the attack is selfish node attack targeted at s and m is identified as the attacker [11]. Code for implementing attack is shown as shown below: If ((((node->nodeaddr)%5)==) && (node->nodeaddr<= 7)) { return; } // discarding all request, reply or data packets 3 Experiment Setup The experimental setup (parameters) which is used to measure the performance of the network when packet dropping and selfish node based attacks are implemented is shown in table 1. GloMoSim which provides a scalable simulation platform for wireless networks, is used to perform the simulation. Table 1: Summary of Simulation Parameters Parameter Terrain Size Mobility Model Value 16 X 16 meters Random Waypoint [Min, Max] speeds ( ms -1, 2 ms -1 ) MAC Protocol Routing Protocol Nominal traffic type CSMA AODV Constant Bit Rate (CBR), 2 connections Number of s 1 Simulation Time 3 Minutes Following performance parameters are evaluated: Delivery Ratio (PDR): Number of successfully delivered legitimate packets as a ratio of number of generated legitimate packets. Total number of s received PDR = Total number of packets sent Number of Collisions: In a network, when two or more nodes attempt to transmit a packet across the network at the same time, a packet collision occurs. When a packet collision occurs, the packets are either discarded or sent back to their originating stations and then retransmitted in a timed sequence to avoid further collision. collisions can result in the loss of packet integrity or can impede the performance of a network. This metric is used to measure such collisions in the network. Energy Consumption: Total energy consumed in the network which is used for processing, forwarding, receiving packet etc. is energy consumption. It is measured in mwhr. Simulation experiments are performed to calculate above three parameters for following scenario in this paper attack for number of attackers varying from 2 to 12 and mobility varying from to 2 mts / sec. With packet dropping based passive DDoS attack for number of attackers varying from 2 to 12 and mobility varying from to 2 mts / sec. With selfish node based passive DDoS attack for number of attackers varying from 2 to 12 and mobility varying from to 2 mts / sec. 4 Results and Discussion Figure 1 show the effects of varying the number of attacking nodes in case of and Passive DDoS attack mechanism on PDR. The PDR of the network decreases rapidly when it is subject to attacks. When the number of attacker is, the network performance does not deteriorate. However, as the number of attackers increases, there are more packets (both legitimate and illegitimate) which compete for channel access in the shared wireless medium. This leads to a drop in the packet delivery ratio. Average PDR in case of no attack, packet dropping and selfish node based PDDoS is.915,.66 and.45 respectively. It is observed that PDR in case of is less as compared to. Delivery Ratio 1.8.6.4.2 2 4 6 8 1 12 Number of ers Fig 1: Effect of varying number of attackers on PDR in case of and Figure 2 show the effects of varying the node mobility in case of and Passive DDoS attack mechanism on PDR. As node mobility increases, link breakages occur more frequently and ISSN: 179-5117 51 ISBN: 978-96-474-155-7

lead to route repairs and maintenance. This increases the overhead in the network, thus causing the network performance to deteriorate and packet delivery ratio (i.e. number of packets successfully transmitted) decreases. Average PDR in case of no attack, packet dropping and selfish node based Passive DDoS is.915,.52 and.23 respectively. It is clear that selfish node based Passive DDoS attack has greater effect on PDR as compared to attack. Figure 3 shows the effect of varying number of attackers on number of collisions in case of packet dropping and selfish node attacks. As the number of attackers increases, it causes increase in number of collisions i.e. packets are unable to reach at their destination. Average number of collisions in case of no attack, packet dropping and selfish node based Passive DDoS is 215, 289 and 865 per simulation time respectively. It is clear that collisions in case of attack are more as compared to dropping attack. Delivery Ratio 1.8.6.4.2 5 1 15 2 Mobility Figure 2: Effect of varying node mobility on PDR in case of and. Number of Collisions 1 8 6 4 2 2 4 6 8 1 12 Number of ers Figure 3: Effect of varying number of attackers on collisions in case of and Figure 4 shows the effect of varying node mobility on number of collisions in case of packet dropping and selfish node attacks. As the node mobility increases, link breakage occurs more frequently and this leads to the more collisions in the network. So, as the node mobility increases number of collisions also increases. Average number of collisions in case of no attack, packet dropping and selfish node based PDDoS is 27, 425 and 995 per simulation time respectively. It is clear that collisions in case of attack are more as compared to dropping attack. Number of Collissions 12 1 8 6 4 2 5 1 15 2 Mobility Figure 4: Effect of varying node mobility on Number of Collisions in case of and Figure 5 shows the effect of varying number of attackers on energy consumption in case of packet dropping and selfish node attacks. As the number of attackers increases energy consumption decreases because node dropping attack node drops the packets those has to send to it for further forwarding even when no congestion occur. This node does not send packet to the destination node in order to save energy i.e. why energy decreases. In case of selfish node, as the number of attackers increases energy consumption increases because selfish node attack involves attacker sending large volumes of traffic to a victim node, to congest the victim node s network bandwidth and route does established. To establish the routes in the network requires lots of energy. Thus, it can predict that as the number of attacker increases energy consumption also increases. Average energy consumption in case of no attack, packet dropping and selfish node based PDDoS is 225.14, 225.11 and 225.13 mwhr respectively. Energy consumption in case of attack and dropping attack is almost same. Energy Consumptions 225.25 225.2 225.15 225.1 225.5 225 2 4 6 8 1 12 Number of ers Figure 5: Effect of varying number of attackers on Energy Consumption in case of and ISSN: 179-5117 52 ISBN: 978-96-474-155-7

Figure 6 shows the effect of varying node mobility on energy consumption in case of dropping and selfish node attack. As the node mobility increases, link breakage occurs more frequently, this leads to the more route repair and maintenance. So, more energy is consumed in route repair or to establish new path. Hence, as the node mobility increases energy consumption also increases. Average energy consumption in case of no attack, packet dropping and selfish node based Passive DDoS is 225.25, 225.17 and 225.22 mwhr respectively. Energy consumption in case of attack and dropping attack is almost same. Energy Consumptions 225.8 225.7 225.6 225.5 225.4 225.3 225.2 225.1 225 5 1 15 2 Mobility Figure 6: Effect of varying node mobility on Energy Consumption in case of and 5 Conclusion This paper implemented two types of Passive DDoS based attack mechanisms ( Based PDDoS and Based DDoS ). Impact of and based Passive DDoS attack is evaluated by finding the packet delivery ratio, energy consumption and collisions by varying node mobility and number of attackers through simulation based experiments. It is found that selfish node based PDDoS attack have greater impact on network performance. PDR in case of node based Passive DDoS attack is less then in case of attack. Performance of networks in terms of collisions is better in case of packet dropping passive DDoS attack as numbers of collisions in case of selfish node based passive DDoS attack are more. Performance of networks in terms of energy consumption is almost same in both the cases. ACKNOWLEDGEMENT The financial assistance provided by Univ. Grant Commission, New Delhi in the form of Major Research Project to Dr. Yogesh Chaba (PI) is acknowledged with thanks. References: [1] Kamanshis Biswas and Liaket Ali, Security Threats in Mobile Ad Hoc Network, Master Thesis, Thesis no: MCS-27:7 (March 22, 27). [2] Vesa Kärpijoki, Security in Ad Hoc Networks, Technical Report: HUT TML 2, Helsinki University of Technology (2). [3] Stephen M. Specht et al., Distributed Denial of Service: Taxonomies of s, Tools, and Countermeasures, Proc. 17th International Conference on Parallel and Distributed Computing Systems, pp. 543-55 (Sep 24). [4] Felix Lau and Stuart H Rubin, Distributed Denial of Service s, Proc IEEE ICSMC, pp 2275-228 (24). [5] Andrim Piskozub, Denial of Service and Distributed Denial of Service s, Proc. TCSET 22, Ukraine (February 18-23, 22) [6] H. Lin, J.G. Delgado-Frias, S. Medidi, Using a Cache Scheme to Detect s in Mobile Ad Hoc Networks, Proc. Communications, Internet, and Information Technology (27). [7] Hugo Miran, Lu ıs Rodrigues, Friends and Foes: Preventing ness in Open Mobile Ad Hoc Networks, IEEE International Workshop on Mobile Distributed Computing, USA (May 23). [8] V. Balakrishnan, V. Varadharajan, Drop : A Serious Threat to Operational Mobile Ad Hoc Networks, Proc. Networks and Communication Systems (25). [9] Shideh Saraeian, Fazllolah Adibniya, Mohammad GhasemZadeh and.seyedazim Abtahi, Performance Evaluation of AODV Protocol under DDoS s in MANET, Proc. World Academy of Science, Engineering and Technology, Volume 33, ISSN 27-374, pp 51-53 (28). [1] Mieso K. Denko, Detection and Prevention of Denial of Service (DoS) s in Mobile Ad Hoc Networks using Reputation-Based Incentive Scheme, Journal Systemics, Cybernetics and Informatics, Volume 3 - Number 4, pp 1-9. [11] Rajendra V. Boppana, Saman Desilva, Evaluation of a Stastical Technique to Mitigate Malicious Control s in Ad Hoc Networks, Proc. International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'6), IEEE Computer Society (26) ISSN: 179-5117 53 ISBN: 978-96-474-155-7