DDoS attack exploiting location information and its mitigation over wireless networks무선네트워크 상에서 위치정보를 악용한 분산서비스거부공격 및 완화방법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 544
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorLee, Hyun-Rok-
dc.contributor.author이현록-
dc.date.accessioned2013-09-12T01:46:40Z-
dc.date.available2013-09-12T01:46:40Z-
dc.date.issued2013-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=513952&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/180372-
dc.description학위논문(박사) - 한국과학기술원 : 전산학과, 2013.2, [ vii, 62 p. ]-
dc.description.abstractThe explosive proliferation of the smart mobile devices drives massive growth in the wireless data communication. In order to provide wireless data communication for the smart hand-held devices, a large number of base stations including access points (APs) based on IEEE 802.11 (WiFi) have been densely deployed. While widespread deployment and expansion of wireless network infrastructure brings the wireless data communication ubiquitously, it has also introduced many security challenges such as Denial of Service (DoS), malicious mobile code, etc., surrounding wireless networks. In this dissertation, we present a novel Distributed Denial of Service (DDoS) attack model exploiting smart mobile device`s location information simultaneously with utilizing active scanning vulnerability in wireless network. Also we provide the simulation result of this attack model in order to evaluate a proof-of-concept of our attack model and show that relatively small number of attacker with tiny volume of active scanning traffic is sufficient to totally interrupt wireless communication. Also we propose a location information protection method based on chameleon hash scheme for a mitigation method against our DDoS attack model. For constructing our DDoS attack model, an attacker who desires to aggress on the wireless network propagates a malicious code in users` smart mobile device. It becomes a zombie device of botnets which is stealthy controlled by C&C servers. After the botnet master issues the attack command, the zombie devices activate their smart active discovery attack, in case of WiFi probe request which is a basic attack unit to evaluate our model. The decisive distinction between existing active discovery attack such as Probe Request Flooding (PRF) and our attack is that there is no clear classification to decide whether normal active discovery protocol or not, due to the tiny volume traffic and reasonable interval of the request message. Furthermore, our attack can be...eng
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectDDoS-
dc.subjectLocation Information-
dc.subject분산서비스거부-
dc.subject위치정보-
dc.subject무선네트워크-
dc.subjectWireless Network-
dc.titleDDoS attack exploiting location information and its mitigation over wireless networks-
dc.title.alternative무선네트워크 상에서 위치정보를 악용한 분산서비스거부공격 및 완화방법-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN513952/325007 -
dc.description.department한국과학기술원 : 전산학과, -
dc.identifier.uid020045324-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0