Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks
Main Author: | |
---|---|
Language: | English |
Published: |
University of Cincinnati / OhioLINK
2010
|
Subjects: | |
Online Access: | http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348 |
id |
ndltd-OhioLink-oai-etd.ohiolink.edu-ucin1289939348 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-OhioLink-oai-etd.ohiolink.edu-ucin12899393482021-08-03T06:14:20Z Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks Prathapani, Anoosha Electrical Engineering AODV BLACKHOLE HONEYPOTS MALICIOUS SPOOFED WIRELESS MESH NETWORKS <p>A Wireless Mesh Network (WMN) is a promising means to provide low-cost broadband Internet access. The routing protocols naively assume all nodes in the network to be non-malicious. The open architecture of WMN, multi-hop nature of communication, different management styles, and wireless communication paves way for malicious attackers. The attackers can exploit hidden loopholes in the multipath mesh routing protocol to conduct a suction attack called a “blackhole attack”. The attacker can falsify routing metric such as hop count, shorten transmission time to reach any destination and thereby suck the network traffic.</p><p>We propose a novel strategy by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements. They are deployed as roaming software agents that tour the network and lure attackers by sending Route Request (RREQ) advertisements. We first examine the threat of an active Blackhole attack, and then, using our intelligent Honeypot mechanism, we try to control it. We collect valuable information on attacker’s strategy from the intrusion logs gathered at the honeypot. We finally evaluate the effectiveness of proposed architecture using simulation in ns-2 for random topology and grid topology. The performance of the proposed detection approach has shown the encouraging results. The performance of the proposed detection scheme is shown to be increased by 80% for grid topology and 77% for random topology.</p> 2010 English text University of Cincinnati / OhioLINK http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348 http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348 unrestricted This thesis or dissertation is protected by copyright: some rights reserved. It is licensed for use under a Creative Commons license. Specific terms and permissions are available from this document's record in the OhioLINK ETD Center. |
collection |
NDLTD |
language |
English |
sources |
NDLTD |
topic |
Electrical Engineering AODV BLACKHOLE HONEYPOTS MALICIOUS SPOOFED WIRELESS MESH NETWORKS |
spellingShingle |
Electrical Engineering AODV BLACKHOLE HONEYPOTS MALICIOUS SPOOFED WIRELESS MESH NETWORKS Prathapani, Anoosha Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks |
author |
Prathapani, Anoosha |
author_facet |
Prathapani, Anoosha |
author_sort |
Prathapani, Anoosha |
title |
Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks |
title_short |
Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks |
title_full |
Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks |
title_fullStr |
Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks |
title_full_unstemmed |
Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks |
title_sort |
intelligent honeypot agents for detection of blackhole attack in wireless mesh networks |
publisher |
University of Cincinnati / OhioLINK |
publishDate |
2010 |
url |
http://rave.ohiolink.edu/etdc/view?acc_num=ucin1289939348 |
work_keys_str_mv |
AT prathapanianoosha intelligenthoneypotagentsfordetectionofblackholeattackinwirelessmeshnetworks |
_version_ |
1719433287181533184 |