A Formal Rule-based Scheme for Digital Investigation in Wireless Ad-hoc Networks

被引:2
|
作者
Rekhis, Slim [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ 7th November, Commun Networks & Secur Res Lab, Carthage, Tunisia
关键词
Digital Investigation; Wireless Networks; Formal Proof; Attack Scenarios Reconstruction; Network of Observation;
D O I
10.1109/SADFE.2009.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing investigation schemes are not suitable to cope with attacks in wireless networks. especially in MANet. We propose in this paper a formal approach for digital investigation of security attacks in wireless networks. We provide a model tor describing attack scenarios in wireless environment. and system and network evidences generated consequently. We develop an inference system that integrates the two types of evidences, handles incompleteness and duplication of information in them, and allows to generate potential and provable actions and attack scenarios. To exemplify the proposal. we consider a case study dealing with it Denial of Service attack oil a web server, where the attacker and the larger represent mobile nodes.
引用
收藏
页码:62 / 72
页数:11
相关论文
共 50 条
  • [21] Investigation of the block ACK scheme in wireless ad hoc networks
    Li, Tianji
    Ni, Qiang
    Xiao, Yang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (06): : 877 - 888
  • [22] Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks
    Park, Seong-Soo
    Lee, Jong-Hyouk
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 345 - +
  • [23] A Quasigroup based Cipher Algorithm for Ad-Hoc Wireless Networks
    Reddy, Rachana M.
    Reddy, Vijender Busi
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 241 - 246
  • [24] Design and implementation of a MAC scheme for wireless ad-hoc networks based on a cooperative game framework
    Fang, ZY
    Bensaou, B
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 4034 - 4038
  • [25] An ad-hoc workflow system architecture based on mobile agents and rule-based processing
    Meng, J
    Helal, S
    Su, S
    IC-AI'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 1-III, 2000, : 245 - 251
  • [26] Geolocation-based routing in wireless ad-hoc networks
    Zhou, B
    Bassiouni, M
    5TH WORLD WIRELESS CONGRESS, PROCEEDINGS, 2004, : 281 - 286
  • [27] Trust-based routing for ad-hoc wireless networks
    Pirzada, AA
    Datta, A
    McDonald, C
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
  • [28] Effective OFDMA Based Signaling in Ad-Hoc Wireless Networks
    Patil, Shailesh
    Anand, M.
    Wu, Xinzhou
    Li, Junyi
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [29] Coverage in wireless ad-hoc sensor networks
    Li, XY
    Wan, PJ
    Frieder, O
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 3174 - 3178
  • [30] Janitor, Certificate and Jury (JCJ) Trust Scheme for Wireless Ad-hoc Networks
    Abuzaid, Mohamad M.
    Azer, Marianne A.
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 383 - 387