A Formal Rule-based Scheme for Digital Investigation in Wireless Ad-hoc Networks

被引:2
|
作者
Rekhis, Slim [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ 7th November, Commun Networks & Secur Res Lab, Carthage, Tunisia
关键词
Digital Investigation; Wireless Networks; Formal Proof; Attack Scenarios Reconstruction; Network of Observation;
D O I
10.1109/SADFE.2009.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing investigation schemes are not suitable to cope with attacks in wireless networks. especially in MANet. We propose in this paper a formal approach for digital investigation of security attacks in wireless networks. We provide a model tor describing attack scenarios in wireless environment. and system and network evidences generated consequently. We develop an inference system that integrates the two types of evidences, handles incompleteness and duplication of information in them, and allows to generate potential and provable actions and attack scenarios. To exemplify the proposal. we consider a case study dealing with it Denial of Service attack oil a web server, where the attacker and the larger represent mobile nodes.
引用
收藏
页码:62 / 72
页数:11
相关论文
共 50 条
  • [41] DASSR: A Distributed Authentication Scheme for Secure Routing in Wireless Ad-hoc Networks
    Phung, Phu H.
    Quang Tran Minh
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 219 - 236
  • [42] Enhanced Hybrid Drive Scheme for Power Saving in Wireless Ad-hoc Networks
    Antoo, Ashlyn
    Koshy, Rani
    2013 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION AND COMPUTING (ICCC), 2013, : 221 - 226
  • [43] Evaluating connectivity in wireless ad-hoc networks
    Vargas-Rosales, C
    Lopez, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3613 - 3617
  • [44] Covert channels in ad-hoc wireless networks
    Li, Song
    Ephremides, Anthony
    AD HOC NETWORKS, 2010, 8 (02) : 135 - 147
  • [45] Optimal design of wireless ad-hoc networks
    Wu, SY
    Anandialingam, G
    TELECOMMUNICATIONS NETWORK DESIGN AND MANAGEMENT, 2003, 23 : 47 - 64
  • [46] Spatial reuse in wireless ad-hoc networks
    Guo, XG
    Roy, S
    Conner, WS
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 1437 - 1442
  • [47] MAC schemes for ad-hoc wireless networks
    Loscri, V.
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 36 - 40
  • [48] Trust Assessment in Wireless Ad-hoc Networks
    Hallani, H.
    Shahrestani, S. A.
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 425 - 429
  • [49] Stealth attacks on ad-hoc wireless networks
    Jakobsson, M
    Wetzel, S
    Yener, B
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2103 - 2111
  • [50] On network coding in wireless ad-hoc networks
    Zhang, Jingyao
    Fan, Pingyi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (03) : 140 - 148