Title :
Tracing Mobile Attackers in Wireless Ad-Hoc Network
Author :
Yang, Ming Hour ; Chiu, Chien-Si ; Shieh, Shiuhpyng
Author_Institution :
Dept. of Inf. & Comput. Eng., Chung Yuan Christian Univ., Chungli
Abstract :
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target´s computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attacking packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attackers in wireless networks is more difficult since intermediate nodes may move or attackers may change their location to hide themselves. Thus, conventional traceback schemes for wired networks cannot apply directly to the wireless network infrastructure because the intermediate routers could be compromised by an adversary. Therefore, we propose a flexible and lightweight traceback scheme to determine the source of attacking packets in a mobile ad-hoc environment. We will demonstrate our method´s ability to track the movement of an attacker and recognize attack traffic launched by the same attacker from different locations.
Keywords :
ad hoc networks; radio access networks; telecommunication security; IP traceback; distributed denial-of-service; intermediate routers; mobile attackers; wireless ad-hoc network; Ad hoc networks; Bandwidth; Computer crime; Filters; IP networks; Information security; Routing protocols; Telecommunication traffic; Web and internet services; Wireless networks;
Conference_Titel :
Internet and Web Applications and Services, 2008. ICIW '08. Third International Conference on
Conference_Location :
Athens
Print_ISBN :
978-0-7695-3163-2
Electronic_ISBN :
978-0-7695-3163-2
DOI :
10.1109/ICIW.2008.50