Learn More
This paper investigates distributed denial of service attacks using non-address-spoofing flood (NASF) over mobile ad hoc networks (MANET). Detection features based on statistical analysis of IDS log files and flow rate information are proposed. Detection of NASF attack is evaluated using three metrics, including detection ratio, detection time and false(More)
The process of using automated software has served law enforcement and the courts very well, and experienced detectives and investigators have been able to use their welldeveloped policing skills, in conjunction with the automated software, so as to provide sound evidence. However, the growth in the computer forensic field has created a demand for new(More)
Mobile ad hoc network (MANET) is particularly vulnerable to flooding attacks. To evade being identified, attackers usually recruit multiple accomplices to dilute attack traffic density of each attack source, and use the address spoofing technique to challenge attack tracing. In this paper, we present a detailed investigation of the flooding attack in MANET.(More)
In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the significant results for some ciphers such as SIMON (a family of lightweight and hardware-optimized block ciphers designed by NSA) etc. However, in the literature,(More)
The process of analyzing available network forensics evidence to determine their meaning and significance can be very involved. It is often necessary to develop a timeline of significant events to obtain an overview of what occurred, to create relational diagrams showing which users are connected to which systems, or to correlate and analyze data to find(More)
Mobile ad hoc networks (MANETs) are particularly vulnerable to denial of service (DoS) attacks. Existing DoS attack traceback approaches are not suitable for tracing the flooding attacks in MANETs. The challenges root in several facts, such as the node mobility and the presence of address spoofing. In this work, we present a behavior-based traceback(More)
The process of using automated software has served law enforcement and the courts very well, and experienced detectives and investigators have been able to use their welldeveloped policing skills, in conjunction with the automated software, so as to provide sound evidence. However, the growth in the computer forensic field has created a demand for new(More)
Many digital forensic tools used by investigators were not originally designed for forensic applications. Even in the case of tools created with the forensic process in mind, there is the issue of assuring their reliability and dependability. Given the nature of investigations and the fact that the data collected and analyzed by the tools must be presented(More)
Proactive security mechanism like authentication, confidentiality and non-repudiation are difficult to implement in MANETs. Some additional security necessities are always desirable like cooperation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism (authentication, encryption) provide(More)