Pattern Based Detection and Mitigation of DoS Attacks in MANET Using SVM-PSO
Proceedings in adaptation, learning and optimization, 2020
In today’s world where most of the communication is done through Internet using wireless networki... more In today’s world where most of the communication is done through Internet using wireless networking, it is important to protect the communication from external attacks. Mobile Ad Hoc Network (MANET) is a type of wireless networks in which automatically connected devices share information for communication using wireless links. Each device cooperates with each other in a distributed manner to facilitate communication in infrastructure less environment. Due to unfixed architecture of network it is quite vulnerable for various attacks. One of the prominent attacks is Denial of Service attack (DoS). It is a type of attack in which nodes are going to be compromised even without knowing of becoming victim of the attacker node. In DoS attacks, the machines stop responding for giving services to the legitimate user as they become busy in responding the attacker’s request. This research work is mainly focused on detecting the DoS attacks in the traffic coming to a node in Mobile ad Hoc Networks. This research work is also focused on identifying the attacked node in the adhoc network. The classification algorithm SVM (Support Vector Machine) is used along with optimization technique PSO (Particle Swarm Optimization) to identify the attacked and non-attacked node in the network. The Simulation is done on NS 2 using LIBSVM and JAVA Script.
Mobile ad hoc network is a self-configured, decentralized, constellation of machines that togethe... more Mobile ad hoc network is a self-configured, decentralized, constellation of machines that together form architecture less movable network. Because of dynamic changing nature of the network, it is more prone to various attacks. DDoS attacks are the major security risk on mobile ad hoc networks (MANET). DDoS attacks have the tendency to make large volume of unauthorized traffic, due to which the legitimate users cannot use the resources. In this work, various DDoS detection and mitigation techniques have been analyzed. This work has abridged various types of DDoS techniques and attack detection methods. It has also identified advantages and disadvantages of various DDoS defense mechanisms. Volumes of academic research have been discussed that depicts a diverse array of methodologies in detecting, preventing, and mitigating the impact of DDoS attacks. Keywords MANET • DDoS attack • DDoS algorithms • Zero-day attack • Resource depletion D. Gautam (B)
Despite enormous efforts in combating DDoS attacks in the past decades. DDoS attacks are still a ... more Despite enormous efforts in combating DDoS attacks in the past decades. DDoS attacks are still a serious threat to the security of cyberspace especially in wireless mobile ad hoc networks (MANET). As more and more essential services become reliant on the Internet as part of their communication infrastructure, the consequences of denial of service attacks can be very damaging. It is difficult to identify benign request and attacker's request. The research objective is to identify the DDoS attacks in attack traffic. This paper emphasizes on the detection of DDoS attacks in MANET based on three parameters bit rate, PDR and delay. The simulation will classify the benign and the malicious traffic using SVM. The entire work is carried on the LIBSVM simulator and dataset is generated on NS2.
Zenodo (CERN European Organization for Nuclear Research), May 20, 2021
The modern business environment requires organizations to be flexible and open to change if they ... more The modern business environment requires organizations to be flexible and open to change if they are to gain and retain their competitive age. Competitive business environment needs to modernize existing legacy system in to self-adaptive ones. Reengineering presents an approach to transfer a legacy system towards an evolvable system. Software reengineering is a leading system evolution technique which helps in effective cost control, quality improvements and time and risk reduction. However successful improvement of legacy system through reengineering requires portfolio analysis of legacy application around various quality and functional parameters some of which includes reliability and modularity of the functions, level of usability and maintainability as well as policy and standards of software architecture and availability of required documents. Portfolio analysis around these parameters will help to examine the legacy application on quality and functional gaps within the application [1]. In this paper we identify and measure risk factors related to quality and functional aspect of legacy system. Paper analyzes a variety of risk components related to quality and functional dimensions of legacy application. Identification and development of various metrics and important measures to compute impact value of individual risk component is also addressed. Existing quality and functional level of legacy system are considered to identify and categories risk components. The impact of various technical issues such as inconsistency between architecture of legacy and target system, unmodularised legacy system architecture, unavailability of required design documents, high degree of coupling between modules of legacy system has been covered in the paper..
Zenodo (CERN European Organization for Nuclear Research), Jul 22, 2020
EReeRisk (Efficient Reengineering Risk) is a risk impact measurement tool which automatically ide... more EReeRisk (Efficient Reengineering Risk) is a risk impact measurement tool which automatically identifies and measure impact of various risk components involve in reengineering process of legacy software system. EReeRisk takes data directly from users of legacy system and establishes various risk measurement metrics according to different risk measurement scheme of ReeRisk framework [1]. Furthermore EReeRisk present a variety of statistical quantities for project management to obtain decision concerning at what time evolution of a legacy system through reengineering is successful. Its enhanced user interface greatly simplifies the risk assessment procedures and the usage reaming time. The tool can perform the following tasks to support decision concern with the selection of reengineering as a system evolution strategy.
Zenodo (CERN European Organization for Nuclear Research), Jul 13, 2020
Currently the Peer-to-Peer computing paradigm rises as an economic solution for the large scale c... more Currently the Peer-to-Peer computing paradigm rises as an economic solution for the large scale computation problems. However due to the dynamic nature of peers it is very difficult to use this type of systems for the computations of real time applications. Strict deadline of scientific and real time applications require predictable performance in such applications. We propose an algorithm to identify the group of reliable peers, from the available peers on the Internet, for the processing of real time application's tasks. The algorithm is based on joint evaluation of peer properties like peer availability, credibility, computation time and the turnaround time of the peer with respect to the task distributor peer. Here we also define a method to calculate turnaround time (distance) on task distributor peers at application level.
Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications
International Journal of Innovative Technology and Exploring Engineering
Cloud applications are becoming a necessary part of modern life. Security is one of the most impo... more Cloud applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. The presented work will be made to observe the need for symmetric security algorithms in Cloud application with Amazon web service. This work observes that the current security level of existing applications recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends Blowfish, RC6 algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication Amazon web service Platform. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution...
IP Source Lockdown to Detect and Mitigate Multi-Destination, Multi-Port, Multi-Protocol DDoS Attacks in SDN
International Journal of Innovative Technology and Exploring Engineering
Distributed Denial of Service (DDoS) attack is not a new attack and remains a challenging task. I... more Distributed Denial of Service (DDoS) attack is not a new attack and remains a challenging task. It has already been addressed by researchers and a lot of work has been done in this direction. Most of the work in Software-Defined-Network (SDN) environment focused on legacy DDoS attacks where targets are end servers. Legacy DDoS attack traffics are associated with a single destination and mostly the solutions are around this characteristic. In the case of SDN, the target is SDN controller plane whose overcharging brings the network to a complete halt. An attacker can achieve this by customizing Multi-Destination, Multi-Port, Multi-Protocol DDoS (MMMD) attack traffic to force the data plane to push more messages to the controller plane. In this paper, we have considered MMMD attack traffic which is just like normal traffic but has the potential to paralyze the complete SDN based networking infrastructure. In the contribution of this work, we have created MMMD traffic and proposed a mod...
The nature of computer network flash crowd traffic, which is generated by legitimate users access... more The nature of computer network flash crowd traffic, which is generated by legitimate users accessing servers or other network resources are similar to the traffic generated by Distributed Denial of Service (DDoS) like attacks. With advancement in spoof packet generation tools, attacker may generate Multi-source Multi-destination Multi-protocol (MMM) traffic; characteristics of such traffic are very similar to on-going genuine/ flash crowd traffic in the network. In the case of Software Defined Network (SDN), attacker’s target is controller plane. Controller plane in SDN is a centralized processing unit of the underlying network, which manages several data planes. Controller plane frames the policies and pushes forwarding rules to the data planes. Data planes just maintain the forwarding rules. Thus by overloading the SDN controller, functionality of complete computer network will be hampered. In this paper, we have proposed Media Access Control (MAC) address based Model to Different...
Social Networking and Computational Intelligence, 2020
Mobile ad hoc network is a self-configured, decentralized, constellation of machines that togethe... more Mobile ad hoc network is a self-configured, decentralized, constellation of machines that together form architecture less movable network. Because of dynamic changing nature of the network, it is more prone to various attacks. DDoS attacks are the major security risk on mobile ad hoc networks (MANET). DDoS attacks have the tendency to make large volume of unauthorized traffic, due to which the legitimate users cannot use the resources. In this work, various DDoS detection and mitigation techniques have been analyzed. This work has abridged various types of DDoS techniques and attack detection methods. It has also identified advantages and disadvantages of various DDoS defense mechanisms. Volumes of academic research have been discussed that depicts a diverse array of methodologies in detecting, preventing, and mitigating the impact of DDoS attacks. Keywords MANET • DDoS attack • DDoS algorithms • Zero-day attack • Resource depletion D. Gautam (B)
Detection of DoS Attacks in MANET using LIBSVM 1569
In MANET(Mobile Ad Hoc Network) nodes are moving constantly so it is difficult to identify benign... more In MANET(Mobile Ad Hoc Network) nodes are moving constantly so it is difficult to identify benign request and attacker’s request. Denial of service attack (DoS) is one of the prominent threat in all types of networks. In MANET, DoS attacks are one of the factor for resource depletion of the victim node. The objective of this paper is to develop a framework to identify the DoS attacks in MANET. This paper emphasizes on the detection of DoS attacks in MANET based on various parameters like bit rate, PDR, delay etc. The simulation will compare and classify the benign and the malicious traffic by classification and testing using SVM. In this paper the behaviour of network traffic is analysed in normal scenerio and attack scenerio and then compairsion is done. The entire work is carried on the LIBSVM simulator and dataset for MANET is generated on NS2.
Pattern Based Detection and Mitigation of DoS Attacks in MANET Using SVM-PSO
Intelligent Computing Applications for Sustainable Real-World Systems, 2020
In today’s world where most of the communication is done through Internet using wireless networki... more In today’s world where most of the communication is done through Internet using wireless networking, it is important to protect the communication from external attacks. Mobile Ad Hoc Network (MANET) is a type of wireless networks in which automatically connected devices share information for communication using wireless links. Each device cooperates with each other in a distributed manner to facilitate communication in infrastructure less environment. Due to unfixed architecture of network it is quite vulnerable for various attacks. One of the prominent attacks is Denial of Service attack (DoS). It is a type of attack in which nodes are going to be compromised even without knowing of becoming victim of the attacker node. In DoS attacks, the machines stop responding for giving services to the legitimate user as they become busy in responding the attacker’s request. This research work is mainly focused on detecting the DoS attacks in the traffic coming to a node in Mobile ad Hoc Networks. This research work is also focused on identifying the attacked node in the adhoc network. The classification algorithm SVM (Support Vector Machine) is used along with optimization technique PSO (Particle Swarm Optimization) to identify the attacked and non-attacked node in the network. The Simulation is done on NS 2 using LIBSVM and JAVA Script.
Port scanning based model to detect Malicious TCP traffic and mitigate its impact in SDN
2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), 2021
Software Defined Network (SDN) is a programmable networking model where control plane and data pl... more Software Defined Network (SDN) is a programmable networking model where control plane and data planes are function separately. Controller can be programmed as per the network’s functional requirement and can manage several data planes centrally. When a new packet is received by data plane and if no flow entry is existing, it encapsulates the received packet in packet_in message and send it to controller to take appropriate decision. In absence of any source traffic validation mechanism available with default SDN controller, it initiates appropriate action and pushes flow table entry to the data plane switch. This functionality of SDN paradigm unlocks an opportunity to overcharge the controller by using malicious traffic. Detection of source of traffic and mitigation of malicious TCP-SYN traffic precisely has been attempted to be addressed in this paper. We have devised a unique technique named "Port scanning based model to detect Malicious TCP traffic and mitigate its impact in SDN" (PMTS), to validate the source of IPs and source port number of TCP-SYN established connections using customized TCP-FIN packets. Proposed model is easy to implement, effective and faster than standard SYN proxy mechanism. Performance of PMTS model has been evaluated under various scenarios. Results obtained are encouraging and same are compared with state-of-arts models available in the literature.
Uploads
Papers by Vrinda Tokekar