Malicious Nodes Identification and Classification of Nodes and Detection of UDP Flood Attack with ICMP using OLSR Routing Protocol in MANET

Authors

  • Sweta Kriplani  Shri Ram Institute of Technology, Jabalpur, Madhya Pradesh, India
  • Rupam Kesharwani  Shri Ram Institute of Technology, Jabalpur, Madhya Pradesh, India

Keywords:

OLSR, SVM, MANET, NS-3, Wireshark, UDP FLOOD, ICMP

Abstract

Mobile ad hoc networks also known as MANETs have been used extensively for the seamless provisioning of information exchange, where the deployment of infrastructure is difficult, if not impossible. Such cases include remote rural areas with stringent topographical profiles, disaster-recovery terrains, battlefields and popular event sites (i.e. sports stadiums, exhibition venues). This new approach of networking brings a great flexibility and affordability to the world of wireless communications by introducing pervasive computing, document sharing, and smart sensors. However, since this kind of network uses the wireless medium for communication, the wireless ad-hoc network faces several security risks at different layers. A particularly severe security attack that affects the ad hoc network routing protocols at the network layer, is known as the Black hole attack. A malicious node advertises itself as having the freshest or shortest path to destination. Once the malicious node attracts the traffic toward itself, the attacker can misuse or discard the traffic and as a result data through the malicious node is lost. To properly protect these systems with limited resources, the security practitioners need to understand the possible security threats and their impacts on MANETs and have a framework to ensure that the protections implemented to mitigate the vulnerabilities in the systems are the most efficient ones possible. In this Research the effects of malicious nodes on MANETs proactive routing protocol, Optimized Link State Routing (OLSR) were studied using NS-3 and their vulnerabilities compared. A framework for a methodical security analysis and recommendation of efficient protection schemes was also developed as well Support Vector Machine (SVM) for classification of categories of node as malicious and normal nodes and Apply filtering rule on network traffic for identification of UDP FLOOD and ICMP attack using Wireshark.

References

  1. Abolhasan M., Wysocki T., Dutkiewicz E., 2003, “A Review of Routing Protocols for Mobile Ad-Hoc Networks,” Telecommunication and Infromation Research Institute University of Wollongong, Australia.
  2. Al-Shurman M., Yoo S.M., and S. Park, 2004, “Black Hole Attack in Mobile Ad-Hoc Networks,” ACM Southeast Regional Conf.
  3. Ammann, P. E. and Sandhu R. S., 1991,"Safety Analysis for the Extended Schematic Protection Model," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 87-97.
  4. Awerbuch B., Holmer D., Nita-Rotaru C., and Rubens H., 2002, “An On-demand Secure Routing Protocol Resilient to Byzantine Failures,” Proceedings of the ACM Workshop on Wireless Security, pp. 21-30.
  5. Beyer D., Vestrich M.D., and Garcia-Luna-Aceves J.J., 1999, ``The Rooftop Community Network: Free, High-Speed Network Access for Communities,'' The First 100 Feet: Options for Internet and Broadband Access, The MIT Press, pp. 75-91.
  6. Bishop, M., 2003. Computer Security Art and Science. Boston, MA: Addison-Wesley. 7]          Bistarelli S., Fioravanti F., and Peretti P., 2006, "Defense Trees for Economic
  7. Evaluation of Security Investments," Proceedings of the First International 183 Conference on Availability, Reliability and Security (ARES'06), Vienna, Austria, pp. 416-423.
  8. Biswas K. and Md. Liaqat Ali, 2007, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March.
  9. Brooke, P. J. and Paige R. F., 2003, "Fault Trees For Security System Design and Analysis," Computers & Security, vol. 22, no. 3, pp. 256-264.
  10. Cisco Networking, Accessed, Feb –April 2011, http://www.cisco.com/warp/public/707/cisco-sa-20091109-tls.pdf
  11. Creswell J. W., 2002. Research Design: Qualitative, Quantitative and Mixed Methods Approach, 2nd Ed, Sage Publication Inc, California.
  12. da Silva A., Martins M., Rocha B., Loureiro A., Ruiz L., and Wong H., 2005,"Decentralized Intrusion Detection in Wireless Sensor Networks," Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, Canada.
  13. Deng H., Li W., Agrawal, D.P., 2002, “Routing security in wireless Ad-Hoc networks,” Cincinnati University of Cincinnati, OH, USA; IEEE Communications Magazine, ISSN: 0163-6804, Vol.40, Oct, pp.70- 75.
  14. Erdal Cayirci, Chunming Rong, 2009, Book Security in wireless Ad Hoc and Sensor Network, John Wiley & Sons Ltd, page 116.
  15. Hu Y., Perrig A., and Johnson D., 2002. Ariadne: A Secure On-Demand Routing for Ad Hoc Networks. Proc. of MobiCom 2002, Atlanta.

Downloads

Published

2016-01-25

Issue

Section

Research Articles

How to Cite

[1]
Sweta Kriplani, Rupam Kesharwani, " Malicious Nodes Identification and Classification of Nodes and Detection of UDP Flood Attack with ICMP using OLSR Routing Protocol in MANET, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 1, pp.90-94, January-February-2016.