ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Dynamic Profile Based Technique to Detect Flooding Attack in MANET

Sathish.T1 and Sasikala.E2
  1. M.Tech, Dept of IT, K.S.R. College of Engineering, Tamilnadu, India
  2. Assistant Professor, Dept of IT, K.S.R. College of Engineering, Tamilnadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

A MANET is a category of wireless ad hoc network that can change locations and configure itself. These types of networks are without fixed infrastructure and are more prone to attacks that occur in the network. The main challenge in MANET is to design the robust security solution that can protect MANET from various routing attacks. Flooding attack is a kind of Denial of service (DOS) attack which is distributive in nature and can exhaust the victim’s network of resources such as bandwidth, energy, computing power etc. In this paper we developed a profile based technique which is used to detect and isolate the flooding attack on MANET using Adhoc on Demand Distance Vector (AODV) routing protocol. A Simulation environment was created by java Simulator.

Keywords

MANET, AODV, RREQ, DPDS

INTRODUCTION

A "mobile ad hoc network" (MANET) is an autonomous system of mobile routers connected by wireless links. The routers are free to move randomly and organize themselves capriciously [1]. Thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion. Each of the nodes has a wireless interface and communicates with its neighbors who are all in its coverage range. Source can reach destination through one or multiple hop. The Ad Hoc On-Demand Distance Vector (AODV) routing protocol [2] enables multi-hop routing between participating mobile nodes wishing to establish and maintain an ad-hoc network. AODV is reactive since it does route request only when needed and does not require nodes to maintain routes to destination that are not actively used in communications. Flooding attack in MANET is a more concealed form of DOS attack which is produced by the unintentional failure of nodes in the network or by malicious action. This flooding attack can cause severe degradation in network performance. The main intention of a flooding attack is to interrupt the services given to legitimate users by targeting the resource at the victim node or the network. By consuming the resources like bandwidth, battery power etc attacker can set up the denial of service to the end user. In flooding attack the bogus control packets are flooded into the network targeting the victim or the network as a whole.
AODV is particularly vulnerable to flooding attack because of its route discovery scheme where the RREQ control packets are broadcasted to all one hop neighbors for finding the path to the destination. Bogus RREQ packets can be disseminated targeting the destination or network and consume the network resources thereby degrading the network performance [3].
In the proposed DPDS approach, every node is set with a profile in order to encounter the distributed attack. The proposed DPDS has its profile values set based on the behavior of MANET. It identifies the attack and tries to isolates it whenever the node tries to cross the defined threshold value. This threshold value is made adaptive based on the average request allowed in the network. Furthermore, another distinguishable contribution made by this DPDS is that it can identify the attack impact as early as it gets started. DPDS approach can also isolate the attack traffic by isolating the malicious node from participating in the network.
This paper is organized as follows: Section 2 explains how RREQ flooding attack can be launched and its effects in MANET. Section 3 presents the related work done to detect and prevent the flooding attack in MANET. Section 4 explains the proposed system. Section 5 describes the system flow and the metrics used to calculate the performance of proposed DPDS detection mechanism and its result analysis. Section 6 explains the conclusion and future work.

FLOODING ATTACK AND ITS EFFECTS

AODV is a reactive routing protocol and it establishes route on demand. It has limit of how much RREQ can be originated by a node. The default value of RREQ_RATELIMIT [4] is 10 as proposed by RFC 3561.The malicious node can override the limit by increasing or disabling it [5]. It can do so because the node has self-control over this rate limit parameter. By this way the malicious node can flood the network with fake RREQs and lead to a kind of DOS attack. In this type of DOS attack the genuine nodes cannot serve other nodes due to the load imposed by fake RREQs. Bandwidth consumption [6] is increased as more number of RREQs is flooded in the network which would otherwise be used by genuine nodes. RREQ packets have high priority than data packets. As the nodes keep on processing the RREQs in spite of data packets there is an overhead in terms of nodes processing time. The routing table entries are created more by the fake RREQs in order to reach destination. Greater amount of network resources like bandwidth are wasted by trying to find routes to destination which do not exist or the routes which are not going to be used for any data communication. This can have very adverse effects in real time applications.

RELATED WORK

In Anonymous communication scheme [7] the traffic from source to destination has to pass through one or more mixes where the Mix reorders and re-encrypts the incoming packet where the incoming and outgoing packet cannot be related so the attacker cannot find the end to end connection and it can also be avoided by using the rate Limitation method which will limit the flow rate of the packets. In support vector machine [8] method the packet is limited by implementing the rreq_ratelimit SVM takes a set of input data and predicts for every given input whether it belong to normal node or malicious node. It collect the behavior of every node and by using those data it find the malicious node. In Trace back scheme [9] any single packet is traced back to its origin with the help of special router in the network which cooperate with each other. However this method is based on assumption that network topology does not change which will not hold good for MANET. Further they require centralized equipment which is not practically feasible in MANET. The behavior based detection [10] defines a profile for the normal behavior and policies which the nodes have to adhere for normal working. Any deviation from the normal statistics is considered to be malicious attempt. It have high false positive rate since no clear line of demarcation. In filtering scheme Public key cryptography and digital signatures are used for authentication of routing messages of nodes [11]. Filter is used to limit the rate of RREQ packets by maintaining the threshold value. Ratelimit and Blacklist-limit are used to avoid RREQ. Blacklist-limit determines the malicious node.

DPDS APPROACH

The proposed DPDS-dynamic profile based detection mechanism for flooding attack in MANET aims at detecting the malicious node and isolating it to enhance the network performance. The dynamic profile based approach has three phases Initialization, detection and isolation phase.

Initialization

In profile initialization phase all the nodes in the network build a table called PT(profile table) and store their profile details. Each node stores all the one hop neighbors profile details [12]. This PT is protected from accessed by the node itself or by the malicious node. The threshold values for RREQ sending and receiving is stored in profile value along with the node identity (Node Id). The threshold value dynamically changes based on the average RREQ flow in the network and the number of users on the network.

Detection

In detection phase each node upon receiving the RREQ packet will check for its profile and records the TS which will help in monitoring the one hop neighbor activity [13]. Any deviation from the profile value is treated as malicious behavior and the node id is added to the isolation list. Further packets from the source are dropped in order to avoid flooding the network, compared to previous approaches where the detection do not have clear line of segmentation. The proposed DPDS distinguishes the attack traffic behavior efficiently as the profile is made adaptive based on network behavior.

Isolation

Once the detection is confirmed, the malicious node id is taken from the isolation list and broadcasted to the neighbors. The neighbor nodes will further restrict receiving the packets from the malicious node. If the entire one hop neighbor nodes refuse to cooperate for forwarding the packets sent by malicious node, then it cannot communicate with other nodes in the network. The node has been isolated from the network in practice even if it is still on the networks in location. The detection mechanism is run at every node. Each node performs the detection and isolation upon the receiving the route request.

SYSTEM FLOW

Simulation Study

Java network simulator jist/swans are used for the implementation for the proposed node profile based detection mechanism [14, 15]. The simulator is extended with customized code for generating the flooding attack and the detection mechanism. The profile is initialized based on hello packet interval which is modified for our approach. The PT entry is deleted if the neighbors do not respond with hello packet i.e. if the node moves out of range and no longer act as one hop neighbor. When the malicious behavior is detected, it triggers the hello packet containing the malicious node id to one hop neighbor. This node id is added to isolation list and further RREQ from that node will be discarded by the neighbor nodes. The hello packet interval is modified as per hello interval extension format in RFC 3561.

AODV Performance Metrics

The performance of the AODV routing protocol with and without flooding attack is studied in term of the following network parameters and by using these metrics the performance of the profile based technique is studied.

Bandwidth consumption

It is measured as the average number of packets received by the intermediate node (wireless channel) from source to destination over a period of time and expressed in Mbps. The bandwidth consumption is affected by the node mobility, frequent topology change, use of control messages. It is desirable to have less bandwidth consumption to serve the user.

End to end delay

It is the total time taken for the packet to reach from source to destination and it is measured in seconds. It includes all the delays in the network such as buffer queues, transmission time and delays induced by routing activities and MAC control exchanges. Due to node mobility, use of control messages and packet retransmissions due to weak signal strengths between nodes, end to end delay increases. Delay should be less for efficient packet transmission.

Packet delivery ratio:

The packet delivery ratio is the ratio of number of packets received at destination node to that of number of packets sent by the source node. It is expressed in percentage. It gives the reliability of the protocol for message deliver. It is affected by node mobility and change in topology. The PDR should be high.

Packet drop rate:

It is the ratio of number of packets dropped during transmission to that of number of packets sent by the source node.It is expressed in percentage.It can occur due to node mobility or buffer overflow.It should be less for efficent routing protocol.

CONCLUSION

A new fangled approach based on profile to detect flooding attack in MANET, DPDS is implemented and its effectiveness is evaluated. The main advantage of DPDS is that it detects the malicious nodes at one hop neighbor level as soon as they start exhibiting the attack behavior. DPDS detects and completely isolates the attacker more efficiently as compared to rate limit approach. With DPDS the availability of the resource is assured for the genuine user with better response time and detection rate. Further it also helps in preventing the resource consumption attack and DOS attack which are concealed form of RREQ flooding attack. In future this work can be further extended for other kind of flooding attacks with respect to AODV like hello packets; data packets etc. DPDS can be applied for application involving POS (point of sale) where timely delivery of data is more important in small mobile environment.

Figures at a glance

Figure 1
Figure 1
 

References