Resource-misuse attack detection in delay-tolerant networks

Vivek Natarajan, Yi Yang, Sencun Zhu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Abstract

In a Delay-Tolerant Network (DTN), data originating from a source node may be delivered to the destination node, despite the non-existence of end-to-end connectivity between them at all times. In an adversarial environment such as a battlefield, DTN nodes could be compromised to launch Denial-of-Service (DoS) attacks by generating excess data, to cause an overflow of the limited resources of the legitimate nodes, hence decreasing the network throughput. A node may also display selfish behavior by generating more data than allowed, to increase its throughput and to decrease the latency of its data packets. In this paper, we term such a DoS attack and selfish data generation behavior, a resource-misuse attack. We study two types of resource-misuse attacks, breadth attacks and depth attacks. Accordingly, we propose different schemes to detect these attacks. Trace-driven simulations using both a synthetic and a real-world trace show that our detection schemes have low average detection latency and additionally, probabilistic detection of the depth attack has low false positive and false negative rates.

Original languageEnglish (US)
Title of host publication30th IEEE International Performance Computing and Communications Conference, IPCCC 2011
DOIs
StatePublished - Dec 1 2011
Event30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011 - Orlando, FL, United States
Duration: Nov 17 2011Nov 19 2011

Publication series

NameConference Proceedings of the IEEE International Performance, Computing, and Communications Conference

Other

Other30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011
CountryUnited States
CityOrlando, FL
Period11/17/1111/19/11

Fingerprint

Delay tolerant networks
Throughput
Denial-of-service attack

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Natarajan, V., Yang, Y., & Zhu, S. (2011). Resource-misuse attack detection in delay-tolerant networks. In 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011 [6108092] (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference). https://doi.org/10.1109/PCCC.2011.6108092
Natarajan, Vivek ; Yang, Yi ; Zhu, Sencun. / Resource-misuse attack detection in delay-tolerant networks. 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011. 2011. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).
@inproceedings{c04294e984454e1b9edb1c70df3ede7a,
title = "Resource-misuse attack detection in delay-tolerant networks",
abstract = "In a Delay-Tolerant Network (DTN), data originating from a source node may be delivered to the destination node, despite the non-existence of end-to-end connectivity between them at all times. In an adversarial environment such as a battlefield, DTN nodes could be compromised to launch Denial-of-Service (DoS) attacks by generating excess data, to cause an overflow of the limited resources of the legitimate nodes, hence decreasing the network throughput. A node may also display selfish behavior by generating more data than allowed, to increase its throughput and to decrease the latency of its data packets. In this paper, we term such a DoS attack and selfish data generation behavior, a resource-misuse attack. We study two types of resource-misuse attacks, breadth attacks and depth attacks. Accordingly, we propose different schemes to detect these attacks. Trace-driven simulations using both a synthetic and a real-world trace show that our detection schemes have low average detection latency and additionally, probabilistic detection of the depth attack has low false positive and false negative rates.",
author = "Vivek Natarajan and Yi Yang and Sencun Zhu",
year = "2011",
month = "12",
day = "1",
doi = "10.1109/PCCC.2011.6108092",
language = "English (US)",
isbn = "9781467300100",
series = "Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference",
booktitle = "30th IEEE International Performance Computing and Communications Conference, IPCCC 2011",

}

Natarajan, V, Yang, Y & Zhu, S 2011, Resource-misuse attack detection in delay-tolerant networks. in 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011., 6108092, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference, 30th IEEE International Performance, Computing and Communications Conference, IPCCC 2011, Orlando, FL, United States, 11/17/11. https://doi.org/10.1109/PCCC.2011.6108092

Resource-misuse attack detection in delay-tolerant networks. / Natarajan, Vivek; Yang, Yi; Zhu, Sencun.

30th IEEE International Performance Computing and Communications Conference, IPCCC 2011. 2011. 6108092 (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Resource-misuse attack detection in delay-tolerant networks

AU - Natarajan, Vivek

AU - Yang, Yi

AU - Zhu, Sencun

PY - 2011/12/1

Y1 - 2011/12/1

N2 - In a Delay-Tolerant Network (DTN), data originating from a source node may be delivered to the destination node, despite the non-existence of end-to-end connectivity between them at all times. In an adversarial environment such as a battlefield, DTN nodes could be compromised to launch Denial-of-Service (DoS) attacks by generating excess data, to cause an overflow of the limited resources of the legitimate nodes, hence decreasing the network throughput. A node may also display selfish behavior by generating more data than allowed, to increase its throughput and to decrease the latency of its data packets. In this paper, we term such a DoS attack and selfish data generation behavior, a resource-misuse attack. We study two types of resource-misuse attacks, breadth attacks and depth attacks. Accordingly, we propose different schemes to detect these attacks. Trace-driven simulations using both a synthetic and a real-world trace show that our detection schemes have low average detection latency and additionally, probabilistic detection of the depth attack has low false positive and false negative rates.

AB - In a Delay-Tolerant Network (DTN), data originating from a source node may be delivered to the destination node, despite the non-existence of end-to-end connectivity between them at all times. In an adversarial environment such as a battlefield, DTN nodes could be compromised to launch Denial-of-Service (DoS) attacks by generating excess data, to cause an overflow of the limited resources of the legitimate nodes, hence decreasing the network throughput. A node may also display selfish behavior by generating more data than allowed, to increase its throughput and to decrease the latency of its data packets. In this paper, we term such a DoS attack and selfish data generation behavior, a resource-misuse attack. We study two types of resource-misuse attacks, breadth attacks and depth attacks. Accordingly, we propose different schemes to detect these attacks. Trace-driven simulations using both a synthetic and a real-world trace show that our detection schemes have low average detection latency and additionally, probabilistic detection of the depth attack has low false positive and false negative rates.

UR - http://www.scopus.com/inward/record.url?scp=84862923316&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84862923316&partnerID=8YFLogxK

U2 - 10.1109/PCCC.2011.6108092

DO - 10.1109/PCCC.2011.6108092

M3 - Conference contribution

AN - SCOPUS:84862923316

SN - 9781467300100

T3 - Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference

BT - 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011

ER -

Natarajan V, Yang Y, Zhu S. Resource-misuse attack detection in delay-tolerant networks. In 30th IEEE International Performance Computing and Communications Conference, IPCCC 2011. 2011. 6108092. (Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference). https://doi.org/10.1109/PCCC.2011.6108092