DDoS Attacks for Ad Hoc Network Based on Attack Cluster

Article Preview

Abstract:

Show the definition of Ad Hoc network attack cluster, and propose a new method of DDoS attacks for Ad Hoc Networks, which can accurately attack the target node, demonstrate no redundant aggressive behavior compared with the traditional attack and reduce the detection rate of aggressive behavior. Use NS2 simulation platform to build Ad Hoc network simulation scenarios with dynamic topology, and simulate DDoS attacks in this environment; The simulation results show that the new DDoS attack method can effectively reduce the communication ability of the Ad Hoc network, and increasing the attack node density will strengthen the attack effect.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

1371-1376

Citation:

Online since:

July 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lidong Zhou, Zygmunt J Haas. Securing Ad Hoc Networks, IEEE Networks Special Isuue on Nerwork Security, 1999, 13(6): 24-30.

DOI: 10.1109/65.806983

Google Scholar

[2] Semih Dokurer. Simulation of black hole attack in wireless ad-hoc networks[D]. Ankara: Atilim university, (2006).

Google Scholar

[3] Wei Yu and K.J. Ray Liu. Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks[C]. IEEE Transactions on Information Forensics and security, JUNE 2007, 2(2): 227-239.

DOI: 10.1109/tifs.2007.897269

Google Scholar

[4] Corson, Macker. Mobile Ad Hoc Networking(MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501, (1999).

DOI: 10.17487/rfc2501

Google Scholar

[5] Lei Guang, Assi, C. Vulnerabilities of Ad Hoc Network Routing Protocols to MAC Misbehavior[C]. IEEE Wireless And Mobile Computing, Network And Communication, Aug. 2005, vol. 3: 146-153.

DOI: 10.1109/wimob.2005.1512897

Google Scholar

[6] Djahel, S.; Nait-Abdesselam, F.; and Ahsan, F. Highlighting the Effects of joint MAC Layer Misbehavior and Virtual Link Attack in Wireless Ad Hoc Networks[C]. IEEE/ACS Computer Systems and Applications, 2009, 756-763.

DOI: 10.1109/aiccsa.2009.5069412

Google Scholar

[7] Wei Ren, Dit-Yan Yeung, Hai Jin, and Mei Yang. Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks[J]. International Journal of Network Security, Mar 2007, 4(2): 227-234.

Google Scholar

[8] N Asokan, Philip Ginzboorg. Key Agreement in Ad Hoc Networks, Computer Communications, 2000, 23(17): 1627-1637.

DOI: 10.1016/s0140-3664(00)00249-8

Google Scholar

[9] X. Hong,M. Gerla,G. Pei, and C. Chiang. A Group Mobility Model for Ad Hoc Wireless Networks[C]. Proceedings of ACM/IEEE MSWiM'99, 1999. 53-60.

DOI: 10.1145/313237.313248

Google Scholar

[10] G. Bianchi. Performance analysis of the IEEE 802. 11 distributed coordinated function[C]. IEEE JSAC, March 2000, 18(3): 535-547.

Google Scholar