Tracing mobile attackers in wireless ad-hoc network

Ming Hour Yang, Chien Si Chiu, Shiuhpyng Shieh

研究成果: Conference contribution同行評審

3 引文 斯高帕斯(Scopus)

摘要

In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attacking packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attackers in wireless networks is more difficult since intermediate nodes may move or attackers may change their location to hide themselves. Thus, conventional traceback schemes for wired networks cannot apply directly to the wireless network infrastructure because the intermediate routers could be compromised by an adversary. Therefore, we propose a flexible and lightweight traceback scheme to determine the source of attacking packets in a mobile ad-hoc environment. We will demonstrate our method's ability to track the movement of an attacker and recognize attack traffic launched by the same attacker from different locations.

原文English
主出版物標題Proceedings - 3rd International Conference on Internet and Web Applications and Services, ICIW 2008
頁面7-12
頁數6
DOIs
出版狀態Published - 2008
事件3rd International Conference on Internet and Web Applications and Services, ICIW 2008 - Athens, 希臘
持續時間: 8 6月 200813 6月 2008

出版系列

名字Proceedings - 3rd International Conference on Internet and Web Applications and Services, ICIW 2008

Conference

Conference3rd International Conference on Internet and Web Applications and Services, ICIW 2008
國家/地區希臘
城市Athens
期間8/06/0813/06/08

指紋

深入研究「Tracing mobile attackers in wireless ad-hoc network」主題。共同形成了獨特的指紋。

引用此