DocumentCode
3532277
Title
Fully distributed dynamically configurable firewall to resist DOS attacks in MANET
Author
Akram, Sidra ; Zubair, Izza ; Islam, M. Hasan
Author_Institution
Fatima Jinnah Women Univ., Rawalpindi, Pakistan
fYear
2009
fDate
28-31 July 2009
Firstpage
547
Lastpage
549
Abstract
MANET (Mobile ad-hoc network) is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, frequent route updation, distributed cooperation, and constrained capability. Any node with in the network can perform malicious activities. Mobile ad-hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this research work I have presented a distributed dynamically configurable firewall architecture that uses the ingress and aggress filtering to resist the DOS (i.e. data flooding attack). In DOS attacks attacker tries to make a connection for a long to disturb the network with its malicious activities. The firewall architecture performs some checks and tries to restrict the malicious user to disturb the network. When the intruder sends many attacking DATA packets to the victim node firewall detects the intruder node and after that, intruder will be restricted by the firewall module for some specified time. When a node is declared as black list user MPR exchanges the black list with other MPRs. Entries in the firewall table are maintained at run time.
Keywords
ad hoc networks; authorisation; mobile radio; telecommunication security; DOS attacks; MANET; denial-of-service attack; distributed dynamically configurable firewall architecture; mobile ad-hoc network; Computer crime; Mobile ad hoc networks; Resists;
fLanguage
English
Publisher
ieee
Conference_Titel
Networked Digital Technologies, 2009. NDT '09. First International Conference on
Conference_Location
Ostrava
Print_ISBN
978-1-4244-4614-8
Electronic_ISBN
978-1-4244-4615-5
Type
conf
DOI
10.1109/NDT.2009.5272096
Filename
5272096
Link To Document