Learn More
Validation Verification Searching a b s t r a c t The process of using automated software has served law enforcement and the courts very well, and experienced detectives and investigators have been able to use their well-developed policing skills, in conjunction with the automated software, so as to provide sound evidence. However, the growth in the(More)
Mobile ad hoc network (MANET) is particularly vulnerable to flooding attacks. To evade being identified, attackers usually recruit multiple accomplices to dilute attack traffic density of each attack source, and use the address spoofing technique to challenge attack tracing. In this paper, we present a detailed investigation of the flooding attack in MANET.(More)
The process of analyzing available network forensics evidence to determine their meaning and significance can be very involved. It is often necessary to develop a timeline of significant events to obtain an overview of what occurred, to create relational diagrams showing which users are connected to which systems, or to correlate and analyze data to find(More)
This paper investigates distributed denial of service attacks using non-address-spoofing flood (NASF) over mobile ad hoc networks (MANET). Detection features based on statistical analysis of IDS log files and flow rate information are proposed. Detection of NASF attack is evaluated using three metrics, including detection ratio, detection time and false(More)
In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the significant results for some ciphers such as SIMON (a family of lightweight and hardware-optimized block ciphers designed by NSA) etc. However, in the literature,(More)
  • Muhammad Nawaz Khan, Muhammad Ilyas Khatak, +26 authors Yang Li
  • 2011
Proactive security mechanism like authentication, confidentiality and non-repudiation are difficult to implement in MANETs. Some additional security necessities are always desirable like cooperation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism (authentication, encryption) provide(More)
Mobile ad hoc networks (MANETs) are particularly vulnerable to denial of service (DoS) attacks. Existing DoS attack traceback approaches are not suitable for tracing the flooding attacks in MANETs. The challenges root in several facts, such as the node mobility and the presence of address spoofing. In this work, we present a behavior-based traceback(More)