Stochastic security performance of active cache based defense against DoS attacks in wireless mesh network

Ye Yan, Jiannong Cao, Zhu Li

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

2 Citations (Scopus)

Abstract

Due to its wireless multi-hop feature, Wireless Mesh Network (WMN) is prone to suffer from many attacks, such as Denial of Service attack(DoS). In the DoS attack, when extortionate high-load flows flood to individual Mesh Routers (MR), they can no longer provide normal services to innocent flows. An active cache based defense solution can detect the existence of attacking flows based on the frequency of incoming packets and eliminate the attacking flows by discarding packets by a Drop Probability(DP). As shown in our simulation study, the selection and variance of DP have a significant impact on the performance of the defense solution to both attacking flows and innocent flows. In this paper, a series of DP selection and variance methods are employed in our simulation studies. From them, we can optimize the DP methods and corresponding parameter setting of the solution against Dos attack by the analysis on the simulation results.
Original languageEnglish
Title of host publicationProceedings - 2009 2nd International Conference on Advances in Mesh Networks, MESH 2009
Pages30-36
Number of pages7
DOIs
Publication statusPublished - 11 Nov 2009
Event2009 2nd International Conference on Advances in Mesh Networks, MESH 2009 - Athens, Glyfada, Greece
Duration: 18 Jun 200923 Jun 2009

Conference

Conference2009 2nd International Conference on Advances in Mesh Networks, MESH 2009
Country/TerritoryGreece
CityAthens, Glyfada
Period18/06/0923/06/09

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Stochastic security performance of active cache based defense against DoS attacks in wireless mesh network'. Together they form a unique fingerprint.

Cite this