4.6 Article

Modeling and Detection of Flooding-Based Denial-of-Service Attack in Wireless Ad Hoc Network Using Bayesian Inference

Journal

IEEE SYSTEMS JOURNAL
Volume 15, Issue 1, Pages 17-26

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2020.2984797

Keywords

Bayesian inference; denial-of-service (DoS) attack; denial of sleep attack; SYN flooding attack; wireless ad hoc network

Ask authors/readers for more resources

Wireless ad hoc networks are crucial in disaster situations, but are vulnerable to various attacks due to lack of centralized management and secure boundaries. The algorithm proposed in the article, based on Bayesian inference, can effectively defend against flooding-based DoS attacks with high detection accuracy and extremely low false detection rate.
Wireless ad hoc networks are widely useful in locations where the existing infrastructure is difficult to use, especially during the situations like flood, earthquakes, and other natural or man-made calamities. Lack of centralized management and absence of secure boundaries make these networks vulnerable to various types of attacks. Moreover, the mobile nodes used in these networks have limited computational capability, memory, and battery backup. Flooding-based denial-of-service (DoS) attack, which results in denial of sleep attack, targets the mobile node's constrained resources which results in excess consumption of battery backup. In SYN flooding-based DoS attack, the attacker sends a large number of spoofed SYN packets which not only overflow the target buffer but also creates network congestion. The present article is divided into three parts: 1) mathematical modeling for SYN traffic in the network using Bayesian inference; 2) proving the equivalence of Bayesian inference with exponential weighted moving average; and 3) developing an efficient algorithm for the detection of SYN flooding attack using Bayesian inference. Based on the comprehensive evaluation using mathematical modeling and simulation, the proposed method can successfully defend any type of flooding-based DoS attack in wireless ad hoc network with higher detection accuracy and extremely lower false detection rate.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available