Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks

Slides:



Advertisements
Similar presentations
What Is an Ad Hoc Network?
Advertisements

Chris Karlof and David Wagner
Release 5.1, Revision 0 Copyright © 2001, Juniper Networks, Inc. Advanced Juniper Networks Routing Module 9: Static Routes & Routing Table Groups.
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
A Survey of Secure Wireless Ad Hoc Routing
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
15-441: Computer Networking Lecture 26: Networking Future.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
On the Effectiveness of Route- Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets Kihong Park and Heejo Lee Network Systems.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
2/16/051 ICMP Traceback Packet Authentication Eunjong Kim Colorado State University
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
1 Computer Networks Switching Technologies. 2 Switched Network Long distance transmission typically done over a network of switched nodes End devices.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
DHCP for Multi-hop Wireless Ad-Hoc Networks Presented by William List.
Review of IP traceback Ming-Hour Yang The Department of Information & Computer Engineering Chung Yuan Christian University
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Delivery, Forwarding, and Routing of IP Packets
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Packet-Marking Scheme for DDoS Attack Prevention
Networking and internetworking devices. Repeater.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
MOBILE IP & IP MICRO-MOBILITY SUPPORT Presented by Maheshwarnath Behary Assisted by Vishwanee Raghoonundun Koti Choudary MSc Computer Networks Middlesex.
Denial of Service attack in IPv6 networks and Counter measurements
Introduction Wireless devices offering IP connectivity
Network Security.
Packet Leashes: Defense Against Wormhole Attacks
Defending Against DDoS
Filtering Spoofed Packets
Internet Networking recitation #4
ODMRP Enhancement.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
CSE 4340/5349 Mobile Systems Engineering
Weak Duplicate Address Detection in Mobile Ad Hoc Networks
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
Ariadne A Secure On-Demand Routing Protocol for Ad Hoc Networks
EEC-484/584 Computer Networks
Intradomain Routing Outline Introduction to Routing
Switching Techniques.
EEC-484/584 Computer Networks
DDoS Attack and Its Defense
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
Network Security Mark Creighton GBA 576 6/4/2019.
Outline The spoofing problem Approaches to handle spoofing
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks Merlin Vincent 2/27/2019 Merlin Vincent, CS522 Research Project

Merlin Vincent, CS522 Research Project Mobile Ad Hoc Networks What are Mobile Ad Hoc Networks? Self-organizing wireless networks No infrastructure (switches, base stations) No central administration All nodes perform routing functions High node mobility 2/27/2019 Merlin Vincent, CS522 Research Project

Merlin Vincent, CS522 Research Project Rogue Traffic What is rogue traffic? Unauthorized messages Recorded and replayed into the network duplicates still must be processed if accepted, can wreak havoc in applications Generated by the adversary incapacitate through invalid data denial of service attack 2/27/2019 Merlin Vincent, CS522 Research Project

Merlin Vincent, CS522 Research Project Countermeasures Against replayed traffic extremely difficult - looks valid authentication is expensive Against generated traffic denial of service techniques ingress filtering • link testing logging • packet marking ICMP traceback 2/27/2019 Merlin Vincent, CS522 Research Project

ICMP Traceback Message (itrace) backward link forward link timestamp router ID probability authentication traced packet contents 2/27/2019 Merlin Vincent, CS522 Research Project

Forward/Backward Links Path information Interface name IPv4 or IPv6 address pair address that packet arrived on address of the next hop possibly several pairs of these MAC address pair, or Operator defined Identifier 2/27/2019 Merlin Vincent, CS522 Research Project

Merlin Vincent, CS522 Research Project itrace Strategy itrace messages generated randomly one in 20,000 messages Sent to packet destination Large volume of traffic required eventually able to derive entire path but can you identify the attacker? but can you disable the attacker? 2/27/2019 Merlin Vincent, CS522 Research Project

Merlin Vincent, CS522 Research Project Conclusion itrace can be helpful in conjunction with packet marking incorporated into routing system But once the attacker is identified? possibly steer antenna nulls questionable, even in wired networks 2/27/2019 Merlin Vincent, CS522 Research Project