Conference Paper

LDoS attack in ad-hoc network

Comput. Sch., Wuhan Univ., Wuhan
DOI: 10.1109/WONS.2009.4801858 Conference: Wireless On-Demand Network Systems and Services, 2009. WONS 2009. Sixth International Conference on
Source: IEEE Xplore

ABSTRACT LDoS (low-rate denial of service) attack is periodic, stealthy, and with high efficiency, which has become a great threat to the network security. Previous researches about LDoS attack mainly focus on its impact on wired networks. However, our analysis shows that such attack could also be launched in ad-hoc network, and as a completely distinct MAC layer protocol is adopted in this environment, the form and effect of the attack could be different and need re-evaluation. This paper presents a study of LDoS attack in ad-hoc network: (1) we investigate the differences of attack form brought by the medium reservation mechanism and CSMA/CA of 802.11b, and find that decreasing the period of LDoS attack into a smaller time scale would achieve a higher attack efficiency; (2) we show that the attack effect differs from that in wired networks, and the attacker's location has an impact on it; (3) we verify our findings by simulation experiments in NS-2; (4) Detection and defense methods are explored to counter against such attack.

0 Bookmarks
 · 
142 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: LDoS (low-rate denial-of-service) was a new type of DoS attack. In this paper, LDoS attack traffic was simulated on OPNET platform and generated by estimating the retransmission time out (RTO) of normal TCP flow based on the analysis of LDoS attack features, and the performance of targets under the attacking of LDoS was tested. We investigated the cache queue of target router for the purpose of detection and defense of LDoS attack. Test result show that two criterions -- packet percentage and threshold--can detect LDoS attack flows.
    Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010; 01/2010

Full-text

View
3 Downloads
Available from