The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services 2005
DOI: 10.1109/mobiquitous.2005.56
|View full text |Cite
|
Sign up to set email alerts
|

SWAT: small world-based attacker traceback in ad-hoc networks

Abstract: Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/DDoS attacker traceback is especially challenging in MANETs for the lack of infrastructure. In this paper, we propose an efficient on-the-fly search technique, SWAT, to trace back DoS and DDoS attackers in MANETs. Our scheme borrows from small worlds, utilizes the concept of Contacts, and use Traffic Pattern Matching (TPM) and Traffic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 9 publications
0
16
0
1
Order By: Relevance
“…Based on ICMP technique, besides iTrace-CP method proposed by Vrizlynn, Kim studied out a scheme researching on flow characteristic. Hotspot-based Traceback [15], CAPTRA [16], the scheme proposed by Kim et al [17] and SWAT [18] are logging-based traceback schemes for wireless network. The above-mentioned schemes [15][16][17][18] mainly inherit from the Hash-based approach.…”
Section: Related Workmentioning
confidence: 99%
“…Based on ICMP technique, besides iTrace-CP method proposed by Vrizlynn, Kim studied out a scheme researching on flow characteristic. Hotspot-based Traceback [15], CAPTRA [16], the scheme proposed by Kim et al [17] and SWAT [18] are logging-based traceback schemes for wireless network. The above-mentioned schemes [15][16][17][18] mainly inherit from the Hash-based approach.…”
Section: Related Workmentioning
confidence: 99%
“…Zarai et al [31] and Kim et al [32] proposed clusterbased traceback schemes only for MANETs with trusted nodes. Kim and Helmy [14] proposed a traceback scheme in MANETs, named SW AT . Their scheme utilizes the small world model and sends the attack traffic signature to neighbor nodes of a victim which observe similar attack traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, because both the scale of a MANET and its data traffic rate are much smaller than that of the high-speed Internet, traceback in MANETs must be more efficient. So far, very little research has been done on traceback in MANETs [12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…애드혹 네트워크와 IP네트워크는 동일한 보안 위협을 가지 고 있으며 DOS나 DDOS 공격이 증가하고 있지만 제한적인 자원 등의 문제로 기존의 역추적 메커니 즘을 적용할 수가 없다 [3] . 현재 MANET을 위한 역 추적 메커니즘에 대한 연구는 클러스터링 기법을 적용한 역추적 메커니즘은 다른 구조들에 비해 최 대 29%의 CPU 사용률을 줄일 수 있기 때문에 클 러스터링 기법을 이용한 역추적 메커니즘 방향으로 연구가 진행되고 있다 [4][5][6][7] . 하지만 다중 홉 기반의 …”
Section: ⅰ 서 론 최근 인터넷의 급속한 성장을 배경으로 모바일unclassified