We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Efficient Algorithm for TCP Attacker Traceback and Countermeasures in MANET using Agents

Published on July 2015 by P.ramesh, H.abdul Rauf, P.mahalakshmi
International Conference on Innovations in Computing Techniques (ICICT 2015)
Foundation of Computer Science USA
ICICT2015 - Number 1
July 2015
Authors: P.ramesh, H.abdul Rauf, P.mahalakshmi
d9ec91ff-eeec-4d8b-aab2-5ec85dcc18c8

P.ramesh, H.abdul Rauf, P.mahalakshmi . An Efficient Algorithm for TCP Attacker Traceback and Countermeasures in MANET using Agents. International Conference on Innovations in Computing Techniques (ICICT 2015). ICICT2015, 1 (July 2015), 1-5.

@article{
author = { P.ramesh, H.abdul Rauf, P.mahalakshmi },
title = { An Efficient Algorithm for TCP Attacker Traceback and Countermeasures in MANET using Agents },
journal = { International Conference on Innovations in Computing Techniques (ICICT 2015) },
issue_date = { July 2015 },
volume = { ICICT2015 },
number = { 1 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icict2015/number1/21453-1457/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Computing Techniques (ICICT 2015)
%A P.ramesh
%A H.abdul Rauf
%A P.mahalakshmi
%T An Efficient Algorithm for TCP Attacker Traceback and Countermeasures in MANET using Agents
%J International Conference on Innovations in Computing Techniques (ICICT 2015)
%@ 0975-8887
%V ICICT2015
%N 1
%P 1-5
%D 2015
%I International Journal of Computer Applications
Abstract

TCP based Denial of Service attacks can cause major problems in Mobile Ad hoc Networks. Tracing the attacker's originand introducing a proper action to retaliate the attacker are the enduring tasks. Surviving methods suffer from major problems due to the typical behavior of Mobile Ad hoc Networks. Then a new bracing methodology is introduced to detect the type of attack and it's origin in MANET using Traffic report. Based on simulations, the attacker origin is tracked down and gives proper countermeasures to retaliate the attack in Mobile Ad hoc Network with low overhead in both communication and computation.

References
  1. H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," Proceedings of IEEE INFOCOM, 2002, pp. 1530-1539.
  2. Kamanshis Biswas, Md. Liakat Ali, "Security Threats in Mobile Ad Hoc Network", 2007
  3. R. Gill, J. Smith, M. Looi, and A. Clark. "Passive Techniques for De- tecting Session Hijacking Attacks in IEEE 802. 11 Wireless Networks". In Proceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCert 2005).
  4. RFC 4987 - TCP flooding attacks and common mitigations.
  5. Seung- won Shin, Ki- young Kim, Jong- soo Jang. "Seung-won Shin, Ki-young Kim, Jong-soo Jang, "D-SAT: Detecting SYN flooding attack by two-stage statistical approach," The Symposium on applications and the Internet, , 2005, pp 430-436.
  6. Y. Ohsita, S. Ata, and M. Murata, "Detecting Distributed Denial-of-Service Attacks by Analyzing TCP SYN Packets Statistically," Proceeding of the IEEE Communications Society Globecom, , 2004, pp. 2043-2049.
  7. Babu BS, Venkataram. P "A dynamic authentication scheme for mobile transactions," International Journal on Network Security 2009, pp. 73-112.
  8. X. Jin, Y. Zhang, Y. Pan, and Y. Zhou, "ZSBT: A novel algorithm for tracing DoS attackers in MANETs," EURASIP Journal on Wireless Communications and Networking, vol. 2006, pp 1-9.
  9. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network support for iptraceback," IEEE/ACM Trans. Networking. , vol. 9, June 2001, pp. 103-144.
  10. Y. Kim and A. Helmy, "CATCH: A protocol framework for cross-layer attacker traceback in mobile multi-hop networks," presented at Ad Hoc Networks, 2010, pp. 193-213.
  11. N. Nishanth and PallapaVenkatram, "Mobile agent based TCP Attacker Identification in MANET using the Traffic History (MAITH)," International Conference on Communication Technology, 2011, pp. 1130-1134.
  12. Vasilios A. SirisyandFotiniPapagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks" , in Proc. Of IEEEGlobecom 2004 (Security and Network Management Symposium), Dallas, USA, November 2004, pp. 66-81.
  13. Kunal Shah, "Performance analysis of mobile agents in wireless internet applications using simulation", 2003.
  14. CERT Advisory CA-96. 21, TCP SYN Flooding and IP Spoofing Attacks, September 24, 1996, pp. 200-213.
  15. Yongjin, V. Sankhla, and A. Helmy, "Efficient traceback of dos attacks using small worlds in manet," in 60th IEEE Vehicular Technology Conference, vol. 6, 2004, pp. 63-91.
  16. A. Helmy, "Small World in Wireless networks," IEEE Communication Letters, vol. 7, No. 10, oct 2003, pp. 490-492.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Tcp Attacks Traffic Report Database Agent.