메뉴 건너뛰기




Volumn 5, Issue 5, 2007, Pages 613-625

Analysis of area-congestion-based DDoS attacks in ad hoc networks

Author keywords

Ad hoc network; Congestion; Denial of service; Distributed denial of service; Security

Indexed keywords

CONGESTION CONTROL (COMMUNICATION); PACKET LOSS; TELECOMMUNICATION SERVICES; TELECOMMUNICATION TRAFFIC;

EID: 33947309586     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2006.04.002     Document Type: Article
Times cited : (12)

References (35)
  • 1
    • 0003336855 scopus 로고    scopus 로고
    • Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing
    • Ferguson P., and Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267 (1998)
    • (1998) RFC , vol.2267
    • Ferguson, P.1    Senie, D.2
  • 2
    • 0033650584 scopus 로고    scopus 로고
    • S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for IP traceback, in: Proceedings of ACM SIGCOMM, 2000, pp. 295-306.
  • 4
    • 84904888755 scopus 로고    scopus 로고
    • J. Mirkovic, G. Prier, P. Reiher, Attacking DDoS at the source, in: Proceedings of IEEE ICNP, 2002, pp. 312-321.
  • 5
    • 84954422497 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, Pi: a path identification mechanism to defend against DDoS attacks, in: Proceedings of IEEE Symposium on Security and Privacy, 2003, pp. 93-107.
  • 6
    • 3543097593 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks, in: IEEE Symposium on Security and Privacy, 2004, pp. 130-143.
  • 7
    • 33947326534 scopus 로고    scopus 로고
    • CERT advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. Available from: (1996).
  • 8
    • 33947305210 scopus 로고    scopus 로고
    • CERT advisory CA-1998-01 smurf IP denial-of-service attacks. Available from: (1998).
  • 9
    • 33947305900 scopus 로고    scopus 로고
    • CERT advisory CA-1996-01 UDP port denial-of-service attack. Available from: (1996).
  • 10
    • 84949938425 scopus 로고    scopus 로고
    • T. Aura, P. Nikander, J. Leiwo, DoS-resistant authentication with client puzzles, in: Proceedings of Security Protocols Workshop 2000, Lecture Notes in Computer Science, Vol. 2133, Cambridge, UK, 2000, pp. 170-181.
  • 12
    • 33947316709 scopus 로고    scopus 로고
    • J. Ioannidis, S.M. Bellovin, Implementing pushback: Router-based defense against DDoS attacks, in: Proceedings of NDSS (2002).
  • 13
    • 0036349004 scopus 로고    scopus 로고
    • J. Li, J. Mirkovic, M. Wang, P. Reiher, L. Zhang, SAVE: source address validity enforcement protocol, in: Proceedings of IEEE Infocom, vol. 3, 2002, pp. 1557-1566.
  • 16
    • 84925368904 scopus 로고    scopus 로고
    • J. Bellardo, S. Savage, 802.11 Denial-of-service attacks: real vulnerabilities and practical solutions, in: Proceedings of USENIX Security Symposium, Washington DC, 2003, pp. 15-28.
  • 17
    • 15944408818 scopus 로고    scopus 로고
    • Q. Gu, P. Liu, C.-H. Chu, Tactical bandwidth exhaustion in ad hoc networks, in: Proceedings of the 5th Annual IEEE Information Assurance Workshop, West Point, NY, 2004, pp. 257-264.
  • 18
    • 33947314594 scopus 로고    scopus 로고
    • C. Wullems, K. Tham, J. Smith, M. Looi, Technical summary of denial of service attack against IEEE 802.11 DSSS based wireless LANs, Tech. rep., Information Security Research Centre, Queensland University of Technology, Brisbane, Australia (2004).
  • 19
    • 85177224014 scopus 로고    scopus 로고
    • N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of ACM MobiCom, 2001, pp. 180-189.
  • 20
    • 11244252132 scopus 로고    scopus 로고
    • I. Aad, J. Hubaux, E. Knightly, Denial of service resilience in ad hoc networks, in: Proceedings of ACM MobiCom, 2004.
  • 21
    • 85177184765 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of ACM MobiCom, 2002, pp. 12-23.
  • 22
    • 1542317831 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in: Proceedings of ACM workshop on Wireless security, 2003, pp. 30-40.
  • 23
    • 84903836776 scopus 로고    scopus 로고
    • P. Ning, K. Sun, How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols, in: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, 2003, pp. 60-67.
  • 24
    • 84961572484 scopus 로고    scopus 로고
    • Y.-C. Hu, D. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications, 2002, pp. 3-13.
  • 25
    • 33947315246 scopus 로고    scopus 로고
    • NS2, The network simulator. Available from: (2004).
  • 27
    • 33846606375 scopus 로고    scopus 로고
    • W. Yu, K.R. Liu, Defense against injecting traffic attacks in cooperative ad hoc networks, in: Proceedings of IEEE Globecom, 2005.
  • 28
    • 33846606856 scopus 로고    scopus 로고
    • Q. Gu, P. Liu, S. Zhu, C.-H. Chu, Defending against packet injection attacks in unreliable ad hoc networks, in: Proceedings of the IEEE Globecom, 2005.
  • 29
    • 0029514136 scopus 로고    scopus 로고
    • H. Chhaya, S. Gupta, Throughput and fairness properties of asynchronous data transfer methods in the IEEE 802.11 MAC protocol, in: Proceedings of the 6th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2, 1995, pp. 613-617.
  • 30
    • 0041438381 scopus 로고    scopus 로고
    • M. Heusse, F. Rousseau, G. Berger-Sabbatel, A. Duda, Performance anomaly of 802.11b, in: Proceedings of the IEEE Infocom, 2003, pp. 836-843.
  • 31
    • 0041973662 scopus 로고    scopus 로고
    • Z. Fu, P. Zerfos, K. Xu, H. Luo, S. Lu, L. Zhang, M. Gerla, The impact of multihop wireless channel on TCP throughput and loss, in: Proceedings of the IEEE Infocom, vol. 3, San Francisco, 2003, pp. 1744-1753.
  • 32
    • 0348195762 scopus 로고    scopus 로고
    • A. Wood, J. Stankovic, S. Son, JAM: a jammed-area mapping service for sensor networks, in: Proceedings of the 24th IEEE Real-Time Systems Symposium, 2003, pp. 286-297.
  • 33
    • 85177498900 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the ACM MobiCom, 2000, pp. 275-283.
  • 34
    • 85177498656 scopus 로고    scopus 로고
    • S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the ACM MobiCom, ACM Press New York, NY, USA, Boston, Massachusetts, United States, 2000, pp. 255-265.
  • 35
    • 4544258840 scopus 로고    scopus 로고
    • Y.-A. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 135-147.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.