Securing wireless mobile nodes from distributed denial-of-service attacks

被引:1
作者
Varadharajan, Vijay [1 ]
Tupakula, Udaya [1 ]
机构
[1] Macquarie Univ, Adv Cyber Secur Res Ctr, Dept Comp, Fac Sci, Sydney, NSW 2109, Australia
关键词
Wi-Fi; mobile networks; intrusion detection; denial of service; distributed denial of service; Mobile IP; Management; reliability; security; CHALLENGES; NETWORKS;
D O I
10.1002/cpe.3353
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. The term mobile botnet refers to group of mobile devices that are compromised and controlled by the attacker that can be used for generating distributed denial-of-service attacks. The security protocols that have been proposed for wireless and mobile networks have several weaknesses that can be exploited by the attacker to obtain unauthorized access and generate attacks. Also, there is growing number of malicious applications that are aimed to compromise smartphones and using them for generating different types of attacks. In this paper, we propose techniques to counteract distributed denial-of-service attacks on wireless mobile devices. We describe the operation and architectural components of our model. We will show that our model is able to efficiently deal with the attacks by dropping the attack traffic before it targets the victim mobile node, can prevent the attack traffic at the upstream nodes, and also deal with the attack cases that involve mobility of the attacking and victim nodes. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:3794 / 3815
页数:22
相关论文
共 49 条
[1]   Mobility management in next-generation wireless systems [J].
Akyildiz, IF ;
McNair, J ;
Ho, JSM ;
Uzunalioglu, H ;
Wang, WY .
PROCEEDINGS OF THE IEEE, 1999, 87 (08) :1347-1384
[2]  
Annamalai Arunmozhi, 2012, WSEAS Transactions on Communications, V11, P331
[3]  
[Anonymous], P 9 US SEC S AUG
[4]  
[Anonymous], 2012, MOB WORLD C 2012
[5]  
[Anonymous], P USENIX SEC S
[6]  
[Anonymous], 2014, MOBILE APPL BEING US
[7]  
[Anonymous], 2013, ANDROID MOBILE ATTAC
[8]  
[Anonymous], P IEEE INFOCOM
[9]  
BAHL P, 2006, P ACM MOBISYS
[10]  
Balakrishnan V, P 10 IEEE IFIP NETW