Tracing mobile attackers in wireless ad-hoc network

Ming Hour Yang, Chien Si Chiu, Shiuhpyng Shieh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attacking packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attackers in wireless networks is more difficult since intermediate nodes may move or attackers may change their location to hide themselves. Thus, conventional traceback schemes for wired networks cannot apply directly to the wireless network infrastructure because the intermediate routers could be compromised by an adversary. Therefore, we propose a flexible and lightweight traceback scheme to determine the source of attacking packets in a mobile ad-hoc environment. We will demonstrate our method's ability to track the movement of an attacker and recognize attack traffic launched by the same attacker from different locations.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Internet and Web Applications and Services, ICIW 2008
Pages7-12
Number of pages6
DOIs
StatePublished - 2008
Event3rd International Conference on Internet and Web Applications and Services, ICIW 2008 - Athens, Greece
Duration: 8 Jun 200813 Jun 2008

Publication series

NameProceedings - 3rd International Conference on Internet and Web Applications and Services, ICIW 2008

Conference

Conference3rd International Conference on Internet and Web Applications and Services, ICIW 2008
Country/TerritoryGreece
CityAthens
Period8/06/0813/06/08

Fingerprint

Dive into the research topics of 'Tracing mobile attackers in wireless ad-hoc network'. Together they form a unique fingerprint.

Cite this