Skip to main content

ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs

Abstract

Denial of service (DoS) attack is a major class of security threats today. They consume resources of remote hosts or network and make them deny or degrade services for legitimate users. Compared with traditional Internet, the resources, such as bandwidth, memory, and battery power, of each node are more limited in mobile ad hoc networks (MANETs). Therefore, nodes in MANETs are more vulnerable to DoS attacks. Moreover, attackers in MANETs cannot only use IP spoofing to conceal their real identities but also move arbitrarily, which makes it a challenging task to trace a remote attacker in MANETs. In this paper, we proposed a zone sampling-based traceback (ZSBT) algorithm for tracing DoS attackers in MANETs. In our algorithm, when a node forwards a packet, the node writes its zone ID into the packet with a probability. After receiving these packets, the victim can reconstruct the path between the attacker and itself. Simulations were carried out to illustrate the validity of the algorithm; even with a little communication overhead.

[12345678910]

References

  1. 1.

    Wrona K: Distributed security: ad hoc networks & beyond. Proceedings of Ad Hoc Networks Security Pampas Workshop, September 2002, Rhul, London, UK

    Google Scholar 

  2. 2.

    Stone R: CenterTrack: an IP overlay network for tracking DoS floods. Proceedings of 9th USENIX Security Symposium, August 2000, Denver, Colo, USA 199-212.

    Google Scholar 

  3. 3.

    Ferguson P, Senie DNetwork Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. RFC 2267, 1998

    Google Scholar 

  4. 4.

    Savage S, Wetherall D, Karlin A, Anderson T: Practical network support for IP traceback. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '00), September 2000, Stockholm, Sweden 295-306.

    Google Scholar 

  5. 5.

    Bellovin S, Leech M, Taylor T: ICMP Traceback Messages. IETF Internet Draft, Version 4, February 2003

    Google Scholar 

  6. 6.

    Zeng X, Bagrodia R, Gerla M: GloMoSim: a library for parallel simulation of large-scale wireless networks. Proceedings of 12th Workshop on Parallel and Distributed Simulation (PADS '98), May 1998, Banff, Alberta, Canada 154-161.

    Google Scholar 

  7. 7.

    Lee HCJ, Thing VLL, Xu Y, Ma M: ICMP traceback with cumulative path, an efficient solution for IP traceback. Proceedings of 5th International Conference on Information and Communications Security (ICICS '03), October 2003, Huhehaote, China 124-135.

    Google Scholar 

  8. 8.

    Thing VLL, Lee HCJ, Sloman M, Zhou J: Enhanced ICMP traceback with cumulative path. Proceedings of 61st IEEE Vehicular Technology Conference (VTC '05), May-June 2005, Stockholm, Sweden 4: 2415-2419.

    Google Scholar 

  9. 9.

    Kim Y, Helmy A: SWAT: small world-based attacker traceback in Ad-hoc networks. Proceedings of IEEE Infocom Poster/Demo Session (INFOCOM '05), March 2005, Miami, Fla, USA

    Google Scholar 

  10. 10.

    Helmy A: Contact-extended zone-based transactions routing for energy-constrained wireless ad hoc networks. IEEE Transactions on Vehicular Technology 2005,54(1):307-319. 10.1109/TVT.2004.839671

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Yi Pan.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Jin, X., Zhang, Y., Pan, Y. et al. ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs. J Wireless Com Network 2006, 096157 (2006). https://doi.org/10.1155/WCN/2006/96157

Download citation

Keywords

  • Information System
  • System Application
  • Major Class
  • Communication Overhead
  • Security Threat