مجال
التميز
|
تميز دراسي وبحثي
|
|
|
البحوث المنشورة
|
|
البحث (1):
|
|
عنوان البحث:
|
Using trust to detect denial of service
attacks in the internet of things over MANETs
|
رابط إلى البحث:
|
Click Here
|
تاريخ النشر:
|
08 May 2017
|
موجز عن البحث:
|
The
rapid growth of employing devices as tools in daily life and the
technological revolution have led to the invention of a novel paradigm; the
Internet of Things (IoT). It includes a group of ubiquitous devices that
communicate and share data with each other. These devices use the Internet
Protocol (IP) to manage network nodes through mobile ad hoc networks (MANET).
IoT is beneficial to MANET as the nodes are self-organising and the
information reach can be expanded according to the network range. Due to the
nature of MANET, such as dynamic topology, a number of challenges are
inherent, such as Denial of Service (DoS) attacks. DoS attacks prohibit
legitimate users from accessing their authorised services. In addition,
because of the high mobility of MANET, the network can merge with other
networks. In this situation, two or more networks of untrusted nodes may join
one another leaving each of the networks open to attack. This paper proposes
a novel method to detect DoS attacks immediately prior to the merger of two
MANETs. To demonstrate the applicability of the proposed approach, a Grayhole
attack is used in this study to evaluate the performance of the proposed
method in detecting attacks.
|
|
|
المؤتمرات العلمية:
|
|
المؤتمر (1):
|
|
عنوان المؤتمر:
|
PGNet 2014
|
تاريخ الإنعقاد:
|
23-24 June
2014
|
مكان
الإنعقاد:
|
Liverpool, UK
|
طبيعة المشاركة:
|
Oral Presentation
|
عنوان المشاركة:
|
Using Trust Based Method to Detect DoS
Attack in MANETs
|
ملخص المشاركة:
|
A mobile ad
hoc network (MANET) consists of nodes that communicate with each other. With
the absence of a central administration and their dynamic topologies, MANETs
are vulnerable to many attacks, the most serious of which is Denial of
Service attacks (DoS). A DoS attack prevents legitimate users from accessing
services and resources, thus considerably degrading the performance of the
network. Several schemes have been posited to detect and respond to this
attack in MANETs, such as distributed firewalls, filtering and so on. This
paper presents a novel approach MDR (Monitoring, Detection, and
Rehabilitation) system which aims to detect and response to DoS attacks in
MANETs. This method is based on a trust concept between nodes and isolates
misbehaving nodes. Nodes need to cooperate with each other and exchange some
information to calculate the trust value. Moreover, trust in this method is a
temporal action and needs to be iteratively checked over time.
|
|
|
المؤتمر (2):
|
|
عنوان المؤتمر:
|
The Tenth International Network Conference
(INC 2014)
|
تاريخ الإنعقاد:
|
08-10 July
2014
|
مكان
الإنعقاد:
|
Plymouth, UK
|
طبيعة المشاركة:
|
Oral Presentation
|
عنوان المشاركة:
|
A Taxonomy of Defence Mechanisms to
Mitigate DoS Attacks in MANETs
|
ملخص المشاركة:
|
In recent
years MANETs (Mobile ad hoc Network) have had a large prevalence in many sectors.
Due to their nature, MANETs have faced some challenges, especially with
regard to security;- dynamic topology, power and bandwidth constraints and
the absence of central administration make MANETs vulnerable to many attacks.
DoS (Denial of Service) attacks are a major problem for the network. These
attacks deplete resources and greatly degrade network performance. In this
paper, a taxonomy of the defence mechanisms is identified and their
advantages and disadvantages are discussed. As posited in this paper, this taxonomy
provides the basis for the development of an approach to detect DoS attacks
in MANETs.
|
|
|
المؤتمر (3):
|
|
عنوان المؤتمر:
|
Science and Information (SAI) Conference
2014
|
تاريخ الإنعقاد:
|
27-29
August 2014
|
مكان
الإنعقاد:
|
London, UK
|
طبيعة المشاركة:
|
Oral Presentation
|
عنوان المشاركة:
|
A survey of the mitigation methods against
DoS attacks on MANETs
|
ملخص المشاركة:
|
In
recent years, the mobile ad hoc network (MANET) has spread to many sectors,
such as education and the military. A MANET is a self-configuring and
spontaneous network that is established without any administrative management
and without fixed infrastructure. Due to its nature, a MANET becomes
vulnerable to many attacks, and in particular, Denial of Service (DoS). DoS
overwhelm the network and deprive legitimate users from using network
resources. There are many methods to mitigate this attack, such as firewalls,
intrusion detection systems and filtering. Each defence method has some
benefits and limitations. In this paper, a description of the components of
an ideal system to mitigate DoS attacks is presented which will help to
design a new method to detect this attack with certainty in MANETs.
|
|
|
المؤتمر (4):
|
|
عنوان المؤتمر:
|
The 8th Saudi Students’
Conference
|
تاريخ الإنعقاد:
|
31 Jan – 01
Feb 2015
|
مكان
الإنعقاد:
|
London, UK
|
طبيعة المشاركة:
|
Oral Presentation
|
عنوان المشاركة:
|
Using Trust Based Method To Detect Dos
Attack In Manets
|
ملخص المشاركة:
|
A MANET
(Mobile Ad Hoc Network) is a group of nodes that communicate with each other
via a wireless shared medium. Each node in a MANET behaves as a router and a
host, so they can communicate with each other separately without needing to
have an access point, and receive and forward packets to another node.
Nowadays, the usage of MANETs has grown in different areas such as conference
meetings, virtual classrooms, the military, rescue systems, voting systems
and many more [1]. The prevalence of MANETs is due to a number of reasons,
such as ease of installation, lack of fixed infrastructure required, and
support for heterogeneous devices. However, the nature of MANETs has made
them vulnerable to many attacks. For example, the absence of an
administrative point and their dynamic topology have made MANETs vulnerable
attacks such as Denial of Service (DoS) attack [2].
A DoS attack
has serious ramifications to MANETs. It paralyses the network by preventing
legitimate users from using the network resources, thus affecting
availability. Such an attack degrades the performance of the network to
legitimate users and may result in financial harm or degradation of services
and resources [3-5].
Recent
research has posited a variety of methods to detect and respond to this type
of attack. These can be grouped into general approaches and attack-specific
approaches. General approaches include firewalls, filtering, IDS (Intrusion
Detection System), Watchdog, Pathrater, Pushback and Traceback. Other
specific approaches, include reputation-based incentive mechanisms, trust
management, DiDDeM and using routing protocols. These have had considerable
success in detecting and responding to this type of attack [6-9].
This
study proposes a novel trust-based approach to detect and respond to this
type of attack. This system aims to detect misbehaving nodes and isolate them
for a specific time. The methodology and system assumptions will be explained
briefly.
|
|
|
المؤتمر (5):
|
|
عنوان المؤتمر:
|
The Fifth International Conference on
Digital Information Processing and Communications (ICDIPC2015)
|
تاريخ الإنعقاد:
|
07-09 Oct
2015
|
مكان
الإنعقاد:
|
Sierre, Switzerland
|
طبيعة المشاركة:
|
Oral Presentation
|
عنوان المشاركة:
|
Comparison of the MrDR method against
different DoS attacks in MANETs
|
ملخص المشاركة:
|
A
Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic
topology, the absence of an administrative point and no fixed infrastructure.
These features make it vulnerable to many attacks, such as the Denial of
Service (DoS) attack. This type of attack deprives users of access to their
legitimate services leading to degradation of the network. This paper posits
the Monitor, Detect, Rehabilitate (MrDR) method, which is applied to detect
three types of DoS attacks: wormhole; greyhole; and jellyfish attacks is an
effective mechanism for dealing with them. The Network Simulator (NS2) was used
to test the efficiency of the MrDR method and the results show that it works
better for greyhole attacks than wormhole attacks, and it works least well in
the case of jellyfish attacks.
|
|
|
المؤتمر (6):
|
|
عنوان المؤتمر:
|
The 30th IEEE International Conference on
Advanced Information Networking and Applications (AINA 2016)
|
تاريخ الإنعقاد:
|
23-25 March
2016
|
مكان
الإنعقاد:
|
Crans-Montana, Switzerland
|
طبيعة المشاركة:
|
Oral Presentation
|
عنوان المشاركة:
|
Detect DoS Attack Using MrDR Method in
Merging Two MANETs
|
ملخص المشاركة:
|
Mobile
Ad hoc Network (MANET) consists of a group of mobile nodes that can move
abruptly in and out the network. MANET has several special specifications
including; non-fixed infrastructure; the absence of a central administration;
limited bandwidth; and limited energy. Merging two MANETs is a situation that
can occur frequently because of mobility. Due to the nature of MANET, it is
vulnerable to attacks such as Denial of Service (DoS). In this paper a
proposed method called Merging Using MrDR (MUMrDR) is used to merge two
MANETs based on the Monitoring, Detection, and Rehabilitation (MrDR) method
to mitigate such attacks. By adopting this method, it will be possible to
detect DoS attacks when merging two MANETs, thereby maintaining network
operations
|