Mobility

Tracing Anonymous Mobile Attackers in Wireless Network

Download Now Free registration required

Executive Summary

In a flooding-based Distributed Denial-of-Service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attack packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attackers in wireless networks is more difficult since intermediate nodes may move or attackers may change their location to hide themselves. Thus, conventional traceback schemes for wired networks cannot apply directly to the wireless network infrastructure because the intermediate routers could be compromised by an adversary.

  • Format: PDF
  • Size: 342.8 KB