Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis
S. Ahmed, and S. Nirkhi. International Journal of Innovative Science and Modern Engineering (IJISME), 1 (7):
52-55(June 2013)
Abstract
Mobile Ad Hoc Networks (MANET) are wireless communication network; in which self capable mobile nodes can dynamically self organize into ad hoc topologies. Seamless interconnection with each other without pre-existing infrastructure makes MANET scalable. In turn scalability also increases the scope of security threats. Dynamic nature of MANET calls for self route management routing algorithm like DSR. Attacks at discovery phase of DSR to discover the route could be launched by attacker/malicious node by flooding (violating broadcasting rules) the route request message (RREQ) and prohibit the normal working of network for duration of time. Flooding is a kind of denial of service (DoS/DDoS) attack. When an attack on the target system is successful enough to hamper the normal working of network, this event triggers investigation. Network forensic analysis is done to analyze the attack scenario and to come up with digital proof against the attacker/attackers. To gather the proof there is the need to empirically analyze the evidential knowledge. Fuzzy logic is good choice for empirical analysis. So, we have implemented a fuzzy forensic analysis system. In this paper, we analyzed the response of fuzzy forensic analysis system that we have implemented.
%0 Journal Article
%1 noauthororeditor
%A Ahmed, S.
%A Nirkhi, S. M.
%D 2013
%E Kumar, Dr. Shiv
%J International Journal of Innovative Science and Modern Engineering (IJISME)
%K DDoS Dynamic Fuzzy MANET Network analysis. attack forensics logic routing source
%N 7
%P 52-55
%T Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis
%U https://www.ijisme.org/wp-content/uploads/papers/v1i7/G0347061713.pdf
%V 1
%X Mobile Ad Hoc Networks (MANET) are wireless communication network; in which self capable mobile nodes can dynamically self organize into ad hoc topologies. Seamless interconnection with each other without pre-existing infrastructure makes MANET scalable. In turn scalability also increases the scope of security threats. Dynamic nature of MANET calls for self route management routing algorithm like DSR. Attacks at discovery phase of DSR to discover the route could be launched by attacker/malicious node by flooding (violating broadcasting rules) the route request message (RREQ) and prohibit the normal working of network for duration of time. Flooding is a kind of denial of service (DoS/DDoS) attack. When an attack on the target system is successful enough to hamper the normal working of network, this event triggers investigation. Network forensic analysis is done to analyze the attack scenario and to come up with digital proof against the attacker/attackers. To gather the proof there is the need to empirically analyze the evidential knowledge. Fuzzy logic is good choice for empirical analysis. So, we have implemented a fuzzy forensic analysis system. In this paper, we analyzed the response of fuzzy forensic analysis system that we have implemented.
@article{noauthororeditor,
abstract = {Mobile Ad Hoc Networks (MANET) are wireless communication network; in which self capable mobile nodes can dynamically self organize into ad hoc topologies. Seamless interconnection with each other without pre-existing infrastructure makes MANET scalable. In turn scalability also increases the scope of security threats. Dynamic nature of MANET calls for self route management routing algorithm like DSR. Attacks at discovery phase of DSR to discover the route could be launched by attacker/malicious node by flooding (violating broadcasting rules) the route request message (RREQ) and prohibit the normal working of network for duration of time. Flooding is a kind of denial of service (DoS/DDoS) attack. When an attack on the target system is successful enough to hamper the normal working of network, this event triggers investigation. Network forensic analysis is done to analyze the attack scenario and to come up with digital proof against the attacker/attackers. To gather the proof there is the need to empirically analyze the evidential knowledge. Fuzzy logic is good choice for empirical analysis. So, we have implemented a fuzzy forensic analysis system. In this paper, we analyzed the response of fuzzy forensic analysis system that we have implemented.},
added-at = {2021-09-23T10:40:03.000+0200},
author = {Ahmed, S. and Nirkhi, S. M.},
biburl = {https://www.bibsonomy.org/bibtex/2b93796dfc13f2ebac57345b22a7400e3/ijisme_beiesp},
editor = {Kumar, Dr. Shiv},
interhash = {d36cc0aa11fabb7671ed4c293d16ee8e},
intrahash = {b93796dfc13f2ebac57345b22a7400e3},
issn = {2319-6386},
journal = {International Journal of Innovative Science and Modern Engineering (IJISME)},
keywords = {DDoS Dynamic Fuzzy MANET Network analysis. attack forensics logic routing source},
language = {En},
month = {June},
number = 7,
pages = {52-55},
timestamp = {2021-09-23T10:40:03.000+0200},
title = {Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis},
url = {https://www.ijisme.org/wp-content/uploads/papers/v1i7/G0347061713.pdf},
volume = 1,
year = 2013
}