DocumentCode :
2158862
Title :
An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET
Author :
Verma, K. ; Hasbullah, H. ; Kumar, Ajit
Author_Institution :
Deptt. of Comput. & Inf. Sci., Univ. Teknol. PETRONAS, Tronoh, Malaysia
fYear :
2013
fDate :
22-23 Feb. 2013
Firstpage :
550
Lastpage :
555
Abstract :
Vehicular Ad hoc Networks (VANET) have emerged as a subset of the Mobile Ad hoc Network (MANET) application; it is considered to be a substantial approach to the Intelligent Transportation System (ITS). VANETs were introduced to support drivers and improve safety issues and driving comfort, as a step towards constructing a safer, cleaner and more intelligent environment. At the present time, vehicles are exposed to many security threats. One of them is the User Datagram Protocol (UDP)- based flooding which is a common form of Denial of Service (DoS) attacks, in which a malicious node forges a large number of fake identities, i.e.-, Internet Protocol (IP) spoofing addresses in order to disrupt the proper functions of the fair data transfer between two fast moving vehicles. Incorporating IP spoofing in the DoS attacks makes it even more difficult to defend against such attacks. In this paper, an efficient method is proposed to detect and defend against UDP flooding attacks under different IP spoofing types. The method makes use of a storage-efficient data structure and a Bloom filter based IPCHOCKREFERENCE detection method. This lightweight approach makes it relatively easy to deploy as its resource requirement is reasonably low. Simulation results consistently showed that the method is both efficient and effective in defending against UDP flooding attacks under different IP spoofing types. Specifically, the method outperformed others in achieving a higher detection rate yet with lower storage and computational costs.
Keywords :
Internet; automated highways; computational complexity; computer network security; data structures; driver information systems; resource allocation; road safety; transport protocols; vehicular ad hoc networks; Defense Method; DoS attacks; IP spoofing types; ITS; Internet protocol spoofing addresses; MANET application; UDP flooding attacks; UDP spoofed flooding traffic; VANET; bloom filter based IPCHOCKREFERENCE detection method; computational costs; data transfer; denial of service attacks; fake identities; intelligent transportation system; lightweight approach; malicious node; mobile ad hoc network application; resource requirement; safety issues; storage costs; storage-efficient data structure; user datagram protocol based flooding; vehicular ad hoc networks; Computer crime; Filtering theory; IP networks; Roads; Vehicles; Vehicular ad hoc networks; Bloom Filter; Hash Function; Internet Protocol (IP); Mobile Ad hoc Network (MANET); User Datagram protocol (UDP); Vehicular Ad hoc Network (VANET);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advance Computing Conference (IACC), 2013 IEEE 3rd International
Conference_Location :
Ghaziabad
Print_ISBN :
978-1-4673-4527-9
Type :
conf
DOI :
10.1109/IAdCC.2013.6514286
Filename :
6514286
Link To Document :
بازگشت