A Formal Rule-based Scheme for Digital Investigation in Wireless Ad-hoc Networks

被引:2
|
作者
Rekhis, Slim [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ 7th November, Commun Networks & Secur Res Lab, Carthage, Tunisia
关键词
Digital Investigation; Wireless Networks; Formal Proof; Attack Scenarios Reconstruction; Network of Observation;
D O I
10.1109/SADFE.2009.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing investigation schemes are not suitable to cope with attacks in wireless networks. especially in MANet. We propose in this paper a formal approach for digital investigation of security attacks in wireless networks. We provide a model tor describing attack scenarios in wireless environment. and system and network evidences generated consequently. We develop an inference system that integrates the two types of evidences, handles incompleteness and duplication of information in them, and allows to generate potential and provable actions and attack scenarios. To exemplify the proposal. we consider a case study dealing with it Denial of Service attack oil a web server, where the attacker and the larger represent mobile nodes.
引用
收藏
页码:62 / 72
页数:11
相关论文
共 50 条
  • [31] Global state routing: A new routing scheme for ad-hoc wireless networks
    Chen, TW
    Gerla, M
    ICC 98 - 1998 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS VOLS 1-3, 1998, : 171 - 175
  • [32] A Constrained Coding-Aware Routing Scheme in Wireless Ad-Hoc Networks
    Zhao, Yimin
    Xiao, Song
    Gan, Hongping
    Li, Lizhao
    Xiao, Lina
    SENSORS, 2019, 19 (10)
  • [33] CKDS: An efficient combinatorial key distribution scheme for wireless ad-hoc networks
    Moharrum, M
    Mukkamala, R
    Eltoweissy, M
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 631 - 636
  • [34] Modeling Trust in Wireless Ad-Hoc Networks
    Ghosh, Tirthankar
    Xu, Hui
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221
  • [35] A Fault Tolerant Scheme for Ad-hoc Networks
    Xu, Zhenpeng
    Zeng, Weini
    Li, Weiwei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 358 - 361
  • [36] Performance analysis of the node cooperative ARQ scheme for wireless ad-hoc networks
    Dianati, M
    Ling, XH
    Naik, K
    Shen, XM
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 3063 - 3067
  • [37] Security in wireless ad-hoc networks - A survey
    Di Pietro, R.
    Guarino, S.
    Verde, N. V.
    Domingo-Ferrer, J.
    COMPUTER COMMUNICATIONS, 2014, 51 : 1 - 20
  • [38] Controlled flooding in wireless ad-hoc networks
    Rahman, A
    Olesinski, W
    Gburzynski, P
    2004 INTERNATIONAL WORKSHOP ON WIRELESS AD-HOC NETWORKS, 2005, : 73 - 78
  • [39] Frugal flouting on wireless ad-hoc networks
    Ercal, Gunes
    Lzhak-Ratzin, Rafit
    Majun-Idar, Rupak
    Meyerson, Adam
    ALGORITHMIC GAME THEORY, PROCEEDINGS, 2008, 4997 : 133 - 144
  • [40] IP traceback for wireless ad-hoc networks
    Thing, VLL
    Lee, HCJ
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3286 - 3290