Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis
S. Ahmed1, S. M. Nirkhi2
1S. Ahmed, Research Scholar, Dept. of Computer Science & Engineering, G.H. Raisoni College of Engineering Nagpur, Maharashtra, India.
2S. M. Nirkhi, Dept. of Computer Science & Engineering, G.H. Raisoni College of Engineering Nagpur, Maharashtra, India.
Manuscript received on June 05, 2013. | Revised Manuscript received on June 11, 2013. | Manuscript published on June 15, 2013. | PP: 52-55 | Volume-1 Issue-7, June 2013. | Retrieval Number: G0347061713
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Mobile Ad Hoc Networks (MANET) are wireless communication network; in which self capable mobile nodes can dynamically self organize into ad hoc topologies. Seamless interconnection with each other without pre-existing infrastructure makes MANET scalable. In turn scalability also increases the scope of security threats. Dynamic nature of MANET calls for self route management routing algorithm like DSR. Attacks at discovery phase of DSR to discover the route could be launched by attacker/malicious node by flooding (violating broadcasting rules) the route request message (RREQ) and prohibit the normal working of network for duration of time. Flooding is a kind of denial of service (DoS/DDoS) attack. When an attack on the target system is successful enough to hamper the normal working of network, this event triggers investigation. Network forensic analysis is done to analyze the attack scenario and to come up with digital proof against the attacker/attackers. To gather the proof there is the need to empirically analyze the evidential knowledge. Fuzzy logic is good choice for empirical analysis. So, we have implemented a fuzzy forensic analysis system. In this paper, we analyzed the response of fuzzy forensic analysis system that we have implemented.
Keywords: DDoS attack; Dynamic source routing; Fuzzy logic; MANET; Network forensics analysis.