Flooding attack manet

26
DEFENSE MECHANISM AGAINST DEFENSE MECHANISM AGAINST FLOODING ATTACKS ON MANET FLOODING ATTACKS ON MANET Presented by M. MuthuMeenakshi Reg.No: 11CS11 Guide : Dr. P. Subathra June 6, 2022 1

description

 

Transcript of Flooding attack manet

Page 1: Flooding attack manet

DEFENSE MECHANISM DEFENSE MECHANISM AGAINST FLOODING AGAINST FLOODING ATTACKS ON MANETATTACKS ON MANET

Presented by

M. MuthuMeenakshi Reg.No: 11CS11

Guide : Dr. P. Subathra

April 9, 20231

Page 2: Flooding attack manet

 BROAD AREABROAD AREA

• Networks Network is a collection of hardware

components and computers interconnected by communication channels that allow sharing of resources and information.

• Network Security Network security consists of provisions

and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification and network accessible resources.

April 9, 20232

Page 3: Flooding attack manet

 SPECIFIC AREASPECIFIC AREA

MANET The MANET(Mobile Adhoc

Networks) is a self-configuring infrastructureless networks of mobile devices connected by wireless links.

Flooding AttackThe flooding attack is an attack

that attempts to cause a failure in a computer system or other data processing entity by providing more input than entry can process properly.April 9, 20233

Page 4: Flooding attack manet

TAXONOMY

April 9, 20234

Page 5: Flooding attack manet

LITERATURE SURVEYLITERATURE SURVEY

April 9, 20235

Page 6: Flooding attack manet

 NOVEL DEFENSE MECHANISM AGAINST

DATAFLOODING ATTACKS IN WIRELESS AD-HOC NETWORKS(2010)

Methodology The Period Based Defense Mechanism (PDM) is

used here, & is used to enhancing the throughput of burst traffic.

Advantage It can guarantee the Quality of Service (QoS) of

burst traffic.Drawback

When the number of packets per second is high (burst traffic), AODV cannot process packets because of the resource exhaustion.

April 9, 20236

Page 7: Flooding attack manet

  FLOODING ATTACKS PREVENTION IN MANET(2011)

Methodology Flooding Attack Prevention (FAP) has been

developed, where FAP refers a defense system against the Ad Hoc Flooding Attack.

It analyse the behaviour of intruder and check it by trust function. Advantage

In FAP, the neighbors are categorized into friends (most trusted), acquaintances (trusted) and strangers(not trusted).

Therefore it is easily identified.Drawback

The Problem is it doesn’t work properly with HIGHER NODE MOBILITY.

April 9, 20237

Page 8: Flooding attack manet

  PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKS

UNDER FLOODING ATTACKS (2011)

Methodology The influence of flooding attack on the entire

network performance is analyzed under the circumstances of different parameters including

i. Number of attack nodesii.Flooding frequencyiii.Network bandwidthiv.Number of normal nodes. Advantage When the number of flooding packets occurs in NIC’s

processing power, most of the packets in the queue are discarded.

April 9, 20238

Page 9: Flooding attack manet

Drawback When the frequency of flooding

increases, the packet delays occurs.when network resources have been

exhausted, with the increasing frequency of flooding attacks, It results in the loss of packets with long routes .

April 9, 20239

Page 10: Flooding attack manet

 HELLO FLOOD ATTACK AND ITS COUNTERMEASURES INWIRELESS SENSOR NETWORKS (2010)

Methodology The proposed security framework for hello flood

detection via A signal strength method A client puzzle method

Advantage The Accuracy will be considerly improved, leading

to better understanding and forecasting such phenomena. Drawback

In these methods, When the node doesn’t receive any reply message in a predefined time, it treats sender as a attacker.

April 9, 202310

Page 11: Flooding attack manet

 A TRUST BASED SECURITY SCHEME FOR RREQ FLOODINGATTACK IN MANET (2010)

Methodology The Distributive approach has been proposed to

detect and prevent the RREQ flooding attack. The effectiveness of the proposed technique

depends on the selection of threshold values. Advantage

When the node identifies that sender is originating dataflooding, it cutt off the path & send error message.Drawback

It get delays to detect the misbehaving node by allowing him to sends more packet until timeout occurs.

April 9, 202311

Page 12: Flooding attack manet

  PERFORMANCE ANALYSIS OF FLOODING ATTACKPREVENTION ALGORITHM IN MANETS (2009)

Methodology The performance of trust algorithm is used to test

the adhoc networks to implementing the AODV protocol.

Advantage In this method, the unnecessary traffic is reduced

and hence the node able to process the data traffic. And also send to the destination node in less time.

Drawback This work didn't develop comprehensive models for

security attacks and a trustworthy security frame-work against all possible security attacks in an ad hoc network. .

April 9, 202312

Page 13: Flooding attack manet

 IMPROVING THE PERFORMANCE OF PROBABILISTICFLOODING IN MANETS (2008)

Methodology This paper has proposed the probabilistic

flooding algorithm in MANETs. The algorithm determines rebroadcast

probability by considering network density. Advantage The algorithm provides flexibility. It is easy to implement with guaranteed message

dissemination. Drawback If the rebroadcast probability p is set to a small

value, the reachability will be poor.

April 9, 202313

Page 14: Flooding attack manet

 PROBABILISTIC BROADCAST FOR FLOODING IN WIRELESSMOBILE AD HOC NETWORKS (2002)

Methodology A purely probabilistic approach has been discussed

about flooding, its attempting to exploit the phase transition phenomenon. Advantage

To maintain high reliability, when inorder to reduce the number of broadcast packets.Drawback

In the mechanism where a system undergoes a small changes of a given parameter in the system induces a great shift in the system's global behavior.

The phenomenon should be extremely cost efficient.

April 9, 202314

Page 15: Flooding attack manet

 EFFECTIVE FILTERING SCHEME AGAINST RREQ FLOODINGATTACK IN MOBILE AD HOC NETWORKS (2007)

Methodology A simple rate based control packet forwarding

mechanism has been introduced to mitigate malicious control packet. Advantage

The protocol can be made secure against other types of possible DOS attacks.

And none of the genuine nodes in the network are wrongly accused as misbehaving node.

Drawback This method does not able to distinguish between

genuine and forged RREQs from the malicious or victim nodes.

April 9, 202315

Page 16: Flooding attack manet

 MISTRAL: EFFICIENT FLOODING IN MOBILE AD-HOCNETWORKS (2006)

Methodology The Mistral compensating mechanism can

support flooding by a wide range of active applications. Advantage

The Mistral compensating mechanism can be applied to other application where the packet loss is an issue.Drawback

It allows only limited simulation modification. And the source code can be evaluated with only

minor modifications.

April 9, 202316

Page 17: Flooding attack manet

 MITIGATING FLOODING ATTACKS IN MOBILE ADHOCNETWORKS SUPPORTING ANONYMOUS

COMMUNICATIONS (2006)

Methodology Anonymous Secure Routing (ASR) protocol was

considered It analyze how an attacker can severely degrade the

performance of the network. Advantage

It can effectively identify and eliminate the nodes that are flooding the network.Drawback

In ASR routing protocol, it is not possible to track back the source and destination nodes in an anonymous network.

April 9, 202317

Page 18: Flooding attack manet

COMPARITIVE STUDY

S.NO

YEAR TITLE AUTHOR EXTRACT

01 2010 Novel Defense Mechanism Against Dataflooding Attacks in Wireless Adhoc Networks.IEEE Transactions on Consumer Electronics, Vol.56, No. 2, May2010

Hyojin Kim, Ramachandra BhargaChitti, and JooSeoSong, Member, IEEE

• PDM mechanism against flooding attacks. • Uses Black list by proposed scheme.• Processes packets according to priority in the black list.

02 2011 Flooding Attacks Prevention in MANET. International Journal of Computer Technology and Electronics Engineering(IJCTEE) Volume 1,Issue 3

Ms. Neetu Singh Chouhan, Ms. ShwetaYadav.

• A distributive approach to identified and prevent the flooding attack.• Prevents flooding attack in AODV Protocol.

03 2011 Performance analysis of MANETs under flooding attacks. Journal of Systems Engineering & Electronics Vol.22, No. 2, April 2011.

Ping Yi , Futai Zou, YanZou , and ZhiyangWang

• Effect of flooding attack on the performance of them is analyzed.• Analysis is done under differ circumstances.

April 9, 202318

Page 19: Flooding attack manet

S.NO

YEAR

TITLE AUTHOR

EXTRACT

04 2010 Hello Flood Attack and its Counterme-asures in WSNs. IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 11, May 2010

Virendra Pal Singh, Sweta Jain and JyotiSinghai

• The Signal strength and Client puzzle method uses for attack detection.• Nodes have been classified as friend and stranger based on the signal strength.

05 2010 A Trust Based Security Scheme for RREQ Flooding Attack in MANET. International Journal of Computer Applns. Vol5 No.12, Aug2010

Shishir K. ShandilyaSunita Sahu.

• A novel technique uses to mitigate the effect of RREQ flooding attack.• Using trust estimation function in DSR on demand routing protocol. • Presents a distributive approach in them.

06 2009 Performance Analysisof Flooding AttackPrevention Algori-thm in MANETs. World Academy of Science, Engineering and Technology. 2009.

Revathi Venkatara-man, M. Pushpalatha, and T.Rama Rao

• It addresses trust evaluation in ad hoc networks. • It based on the extent of friendship between the nodes.

19

Page 20: Flooding attack manet

S.NO

YEAR

TITLE AUTHOR

EXTRACT

07 2008 Improving the Perfor-mance of Probabilistic Flooding in MANETs.Second Interna-tional proceedings in Univ of Glasgow, G12 8RZ U.K.

M. Bani Yassein, M.Ould Khaoua, L.M.Mackenzi and S.Papanastasiou

• Presents a new probabilistic approach • It dynamically adjusts the rebroadcasting proba-bility as per the node movement. • It without requiring any assistance of distance measurements or exact location determination devices.

08 2007 Effective Filtering Sc-heme against RREQ Flooding Attack in MANETs.International proceedings on net-works in HuazhongUniv. of Science & Technology 2007.

Jian-Hua Song, FanHong , Yu Zhang.

• A simple rate based control packet forwarding mechanism was introduced.• Used to mitigate malicious control packet floods. A distrusted filtering mechanism is proposed to mitigate the loss of throughput.

09 2006 MISTRAL: Efficient Flooding in Mobile Adhoc Networks. ACM proceedings MobiHoc 06,May Florence, 2006 ACM.

Stefan Plis-ch, Mahesh Balakrishnan, KenBirmn, Robbertvan Renesse

• An novel approach to flooding compensating for flooding packets that are not rebroadcast. • Mistrals compensation mechanism applies to applications where packet loss is an issue.

20

Page 21: Flooding attack manet

S.NO

YEAR

TITLE AUTHOR

EXTRACT

10 2006 Mitigating FloodingAttacks in MobileAdhoc Networks Sup-porting AnonymousCommunications.2006,Proceedings onNetwork Macquarie University, Australia

Venkat Balakrishnan,Vijay Vara-dharajan, & UdayTupakula, Elisabeth Gaup Moe

• The flooding and packet drop attacks was analyzed that support anonymous communication. • The technique has to identify the benign behaviour of expelled node.

11 2002 Probabilistic Broad-cast for Flooding inWireless Mobile Adhoc Networks. Technical ReportIC/2002 Swiss Federal institute ofTechnology (EPFL)Lausanne,Switzerland

Jian-Hua Song, FanHong , Yu Zhang.

• The proposed mechanism prevents this specific kind of DoS attack.• It does not use any additional network bandwidth. •A purely probabilistic approach attempting to exploit the phase transition phenomenon.

21

Page 22: Flooding attack manet

BASE PAPERBASE PAPERNOVEL DEFENSE MECHANISM AGAINST DATAFLOODING ATTACKS IN WIRELESS AD-HOC NETWORKS

AUTHOR : HYOJIN KIM, RAMACHANDRA BHARGAV CHITTI, AND JOOSEOK SONG, MEMBER, IEEE

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, VOL. 56, NO. 2, MAY 2010

The identified problem is, When the number of packets per second is high (burst traffic), AODV cannot process packets because of the resource exhaustion.

The proposed scheme of Period Based Defense Mechanism(PDM) enhances the throughput of burst traffic under the data flooding attack.

PROPOSED WORKPROPOSED WORKThe work is looking forward to use Modified Adhoc

Ondemand Distance Vector (MAODV) protocol.

April 9, 202322

Page 23: Flooding attack manet

CONCLUSION In the first phase, by the discussion of about

some flooding attacks and their prevention measures in MANETs, its going to implement a Period based defense mechanism, it is also seen that MAODV would give better results than AODV.

And in the second phase, the work will aim at simulating the throughput of the PDM scheme according to the number of attackers and the number of transferred packets per second by using NS-2 simulations.

April 9, 202323

Page 24: Flooding attack manet

REFERENCES

A. Jamalipour, "Self-organizing networks [message from the editor-in-chief]," IEEE Wireless Communications , vol. 15, no. 6, pp.2-3, Dec. 2008.

S.-J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks," IEEE International Conference on Communications(ICC2001) vol. 10, pp. 3201-3205, Jun. 2001.

L. Xia and J. Slay, "Securing wireless adhocnetworks: towards a mobile agent security architecture," the 2nd Australian Information Security Management Conference 2004 (InfoSec 2004) Nov. 2004.

M. Al-Shurman, S.M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," the 42nd annual Southeast regional conference ACM Southeast Regional Conference (ACMSE 2004) , pp. 96-97, Apr. 2004. April 9, 202324

Page 25: Flooding attack manet

Ming-Yang Su, “ Prevention of selective black hole attacks on mobile adhoc networks through intrusion detection systems” , Elsevier computer communication 34 on 2007.

Yingbin liang, Member, IEEE, H. Vincent Poor, Fellow, and Lei Ying, “ Secrecy Throughput of MANETs Under Passive and Active Attacks “, IEEE Transactions on Information Theory, Vol. 57, No.10, October 2011.

Todd R. Andel, Alec Yasinsac , “ Surveying Security Analysis Techniques in MANET Routing Protocols “, the 4th quarter 2007, Volume 9, No.4, October 2007.

Charles E. Perkins and Elizabeth M.Royer, “ Adhoc On-Demand Distance Vector Routing” , the Second international conference ACMSE, Jan. 2000.

Panagiotics Padadimitratos , Member, IEEE, Zygmunt J.Hass, “ Secure Data Communication in Mobile Adhoc Networks” , IEEE Journal on Selected Areas in Communications, Vol.24, No.2, Febryary 2006.

April 9, 202325

Page 26: Flooding attack manet

THANK YOUTHANK YOU

April 9, 202326