Title :
Design approaches for stealthy probing mechanisms in battlefield networks
Author :
Ganesh, Shriram ; Natu, Maitreya ; Sethi, Adarshpal ; Gopaul, Richard ; Hardy, Rommie
Author_Institution :
Univ. of Delaware, Newark, DE
Abstract :
Various approaches have been proposed in the past for monitoring a network to diagnose failures and performance bottlenecks. One such approach for efficient and effective monitoring is probing. Probes such as ICMP pings are an effective tool for detecting network nodes which have been compromised by an attacker who tries to delay or drop traffic passing through the captured node. However an intelligent attacker may evade detection by giving preferential treatment to probe traffic. This is usually possible because probe packets have a different format from regular application packets and are easily distinguishable. Hence, it is important to probe in a stealthy manner so as to avoid identification of probes by an attacker and to ensure the collection of accurate system health statistics. In this paper, we review design approaches for generating stealthy probes and describe various possible mechanisms that can be used for such a design. These approaches are evaluated according to the design criteria and we identify what may be feasible solutions for stealthy probing in battlefield ad-hoc wireless networks.
Keywords :
ad hoc networks; fault diagnosis; military communication; telecommunication network reliability; ICMP pings; battlefield ad-hoc wireless networks; stealthy probing mechanisms; Bandwidth; Collaboration; Condition monitoring; Delay; Government; Probes; Routing; Telecommunication traffic; Testing; Wireless networks;
Conference_Titel :
Military Communications Conference, 2008. MILCOM 2008. IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-2676-8
Electronic_ISBN :
978-1-4244-2677-5
DOI :
10.1109/MILCOM.2008.4753117