Abstract
Mobile ad hoc networks (MANETs) play a vital role in ubiquitous computing. Multimedia communication is the main aspect of MANETs in emergency networks. Security is the major concern in such networks. MANETs are prone to many security problems because of their dynamic changing nature. One of the main attacks that affect any communication in a MANET is the denial-of-service attack. In this paper, such an attack called SYN flooding attack and its detection method are discussed. The presence of the SYN flooding attack in networks may not be identified correctly at an early stage. This leads to the denial of legitimate services at the multimedia server. An algorithm is presented in this paper to detect the presence of the SYN flooding attack at an early stage. The malicious node, instead of launching the SYN flooding attack, may try to delay the communication. This algorithm also finds such malicious nodes which try to affect the multimedia communication in MANETs by introducing unnecessary delays. The solution method involves game theory to form a game between the malicious node and the multimedia server node. The performance of the detection algorithm is verified by analyzing the various quality of service parameters relevant to multimedia communication.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Nguyen H.L.; Nguyen U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Netw. 61, 32–46 (2008)
Panaousis, E.A.; Politis, C.: Securing ad hoc networks in extreme emergency cases. In: Proceedings of the World Wireless Research Forum, Paris (2009)
Kannhavong B.: A survey of routing attacks in mobile ad hoc networks. IEEE Wirel. commun. 5, 85–91 (2007)
Maheshwari, R.; Gao, J.; Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: 26th IEEE International Conference on Computer Communications, pp. 107–115 (2007)
Lemon, J.: Resisting SYN flood DoS attacks with a SYN cache. In: Proceedings of The BSD Con Conference, pp. 89–97. San Francisco (2002)
Bin, X.; Chen, W.; He, Y.X.; Sha, E.H.-M.: An active detecting method against SYN flooding attack. In: Proceedings of 11th International Conference on Parallel and Distributed Systems, pp. 709–715 (2005)
Bin, X.; Wei, C.; Yang Xiang, H.: An autonomous defence against SYN flooding attacks: detect and throttle attacks at the victim side. J. Parallel Distrib. Comput. 68(4), 456–470 (2008)
Siris Vasilios A., Fotini P.: Application of anomaly detection algorithms for detecting SYN flooding attacks. Comput. Commun. 29.9, 1433–1442 (2006)
Wang S., Sun Q., Zou H., Yang F.: Detecting SYN flooding attacks based on traffic prediction. Secur. Commun. Netw. 5, 1131–1140 (2012)
Haris, S.H.C.; Ahmad, R.B.; Ghani, M.A.H.A.: Detecting TCP SYN flood attack based on anomaly detection. In: Second International Conference on Network Applications Protocols and Services, pp. 240–244 (2010)
Salem, O.; Mehaoua, A.; Vaton, S.; Gravey, A.: Flooding attacks detection and victim identification over high speed networks. In: Information Infrastructure Symposium, pp. 1–8 (2009)
Tartakovsky, A.G.; Polunchenko, A.S.; Sokolov, G.: Efficient computer network anomaly detection by changepoint detection methods. IEEE J. Sel. Top. Signal Process. 7(1), 4–11 (2013)
Changhua, S.; Jindou, F.; Lei, S.; Bin, L.: A novel router-based scheme to mitigate SYN flooding DDoS attacks. In: Proceedings of the IEEE INFOCOM (2007)
Chen, W.; Dit-Yan, Y.: Defending against TCP SYN flooding attacks under different types of IP spoofing. In: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL), pp. 38–38 (2006)
Changhua, S.; Hu, C.; Tang, Y.; Liu, B.: More accurate and fast SYN flood detection. In: Proceedings of 18th International Conference on Computer Communications and Networks, pp. 1–6 (2009)
Ling Y., Ye G., Guiyi W.: Detect SYN Flooding Attack in Edge Routers. Int. J. Secur. Appl. 3, 31–45 (2009)
Kim, T.; Choi, Y.; Kim, J.; Hong, S.J.: Annulling SYN flooding attacks with whitelist. In: Proceedings of the IEEE 22nd International Conference on Advanced Information Networking and Applications, pp. 371–376 (2008)
Dinil, M.D.; Murthy, H.A.; Gonsalves, T.A.: Detection of SYN flooding attacks using linear prediction analysis. In: 14th IEEE International Conference on Networks, pp. 218–223 (2006)
Korczynski, M.; Janowski, L.; Duda, A.: An accurate sampling scheme for detecting SYN flooding attacks and portscans. In: Proceedings of the IEEE International Conference on Communication, pp. 1–5 (2011)
Ranjan, N.; Murthy, H.A.; Gonsalves, T.A.: Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique. In: Proceedings of the 2010 National Conference on in Communications, pp. 1–5 (2010)
Ohsita, Y.; Shingo, A.T.A.; Murata, M.: Detecting distributed Denial-of-service attacks by analyzing TCP SYN packets statistically. IEICE Trans. Commun. 2868–2877 (2006)
Wang, H.; Zhang, D.; Shin, K.: Detecting SYN flooding attacks. In: Proceedings of IEEE INFOCOM, pp. 1530–1539 (2002)
Bellaiche, M.; Gregoire, J.-C.: SYN flooding attack detection based on entropy computing. In: IEEE Proceedings of the Global Telecommunications Conference, pp. 1–6 (2009)
Changhua, S.; Jindou, F.; Bin, L.: A robust scheme to detect SYN flooding attacks. In: Second International Conference on Communications and Networking, pp. 397–401 (2007)
Al-Duwairi, B.; Manimaran, G.: Intentional dropping: a novel scheme for SYN flooding mitigation. In: Proceedings of INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 2820–2824 (2005)
Mirkovic, J.; Reiher, P.: D-WARD: a source-end defense against flooding denial-of-service attacks. IEEE Trans. Dependable Secure Comput. 216–232 (2005)
Garg, A.; Reddy, A.N.: Mitigation of DoS attacks through QoS regulation. Microprocess. Microsyst. 28(10), 521–530 (2004)
Haggerty, J.; Berry, T.; Shi, Q.; Merabti, M.: DiDDeM: a system for early detection of TCP SYN flood attacks. In: IEEE Proceddings of the Global Telecommunications Conference, pp. 2037–2042 (2004)
Schuba, C.L.; Krsul, I.V.; Kuhn, M.G.; Spafford, E.H.; Sundaram, A.; Zamboni, D.: Analysis of a denial of service attack on TCP. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 208–223 (1997)
Von Neumann J., Morgenstern O.: Theory of Games and Economic Behavior (60th Anniversary Commemorative Edition). Princeton university press, Princeton (2007)
Osborne, M.; Rubinstein, A. (1994) A Course in Game Theory. The MIT press, Cambridge
Agah, A.; Das, S.K.; Basu, K.; Asadi, M.: Intrusion detection in sensor networks: A non-cooperative game approach. In: Proceedings of the Network Computing and Applications, pp. 343–346 (2004)
Agah, A.; Basu, K.; Das, S.K.: Preventing DoS attack in sensor networks: a game theoretic approach. In: Int. Conf. Commun. 3218–3222 (2005)
Panaousis, E.A.; Politis, C.: Non-cooperative games between legitimate nodes and malicious coalitions in MANETs. In: proceedings of the Future Network and Mobile Summit Conference (2011)
Panaousis, E.; Politis, C.: A game theoretic approach for securing AODV in emergency mobile ad hoc networks. In: Proceedings of the 34th IEEE Conference on Local Computer Networks, pp. 985–992 (2009)
Anantvalee, T.; Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Wireless Network Security, pp. 159–180. Springer, US (2007)
Murthy, C.S.R.; Manoj, B.S.: Ad hoc wireless networks: architectures and protocols. Pearson Education (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Geetha, K., Sreenath, N. Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol. Arab J Sci Eng 41, 1161–1172 (2016). https://doi.org/10.1007/s13369-015-1963-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-015-1963-8