A Study on Security Protocols for Hacking Prevention
By
Table of Contents
LIST OF TABLESiii
INTRODUCTION1
VULNERABILITY/ WEAKNESS2
Stealing Password2
Foot Printing3
Forge Target Address Attack5
Rootkit or Backdoor5
Thumbsucking6
Posing7
Pod Slurping7
Blue Snarfing8
Spyware9
Abuse Shooter's CH Attack10
Foot Printing10
RESISTANCE/SUSTAINABILITY12
ARIP Routing Protocol12
Confirm RG Protocol12
Watching Protocol12
Permit Protocol13
Defending Against Forge Target Address Attack13
Defending Against Abuse Ask Message Attack14
Defending Against Abuse Shooter's CH Attack14
Simulation Environment15
Performance Metrics15
Simulation Results16
SECURITY FRAMEWORK18
Advanced Alert System (AAS)18
Data Encryption (DE)18
Functional Design18
Information Flow18
Log Messages20
Emails, SMSs and Snapshots21
Conclusion21
References24
LIST OF TABLES
Table 1: Vulnerability/ Weakness11
Table 2: Resistance/Sustainability17
Table 3: Security Framework22
INTRODUCTION
Usually when a hacker plans to attack a node in the network, he needs to get hold of the victim's IP address. The IP address reveals the point of entry to the computer of the victim and can be used to trace the enterprise's network or a public terminal. In MANETs, the IP of a mobile node is a unique identifier (Adm, 2003).
Considering the realm and understanding of the challenges and the problems associated with Mobile Ad-hoc Networks (MANET's), it becomes rather visible and clear that the disruptive influences would significantly add to the consumption of energy and power resources, raising the cost of overhead to rise vastly with the each node.
This ultimately would make way for leading to clutter communication patterns and cause experienced and maximum delay and downtime for communication specifications to take place altogether (Chang, 2007).
Extending upon the overhead cost to rise, the consumption of energy would cause the nodes to saturate. It is because of this, it makes way for some of the packets placed at those nodes, which requires extraction and a complete retransmissions, which cause the disposal and wastage of important communication resources (Chiappa, 2009).
Therefore, as an end result, a circumstance or a situation that is reminiscent to that of the black hole in this traffic may appear altogether, making the entire network be severally affected because of the excessive packet delay (Desilva & Boppana, 2005). For the researcher, keeping in lieu of these uncertainities to occur bullets critical network performance parameters, which maybe affected by these destructive attacks upon mobile nodes.
Packets Delay: To begin with the listings of the attacks, they influence the functionality and movement of the normal nodes that exist in the operation and movement of the nodes, causing them to drop from the loop altogether (Egevang and Francis, 2006). Hence as a result, a heightened and accelerated increase in the weight and measurement of packets delay for these nodes as the MANET's become evident.
Packet Loss Rate: With the constant rise and strikes of these malicious attacks, the buffer space, which is the room for safety and security at the time of attacks, may become severally affected and exhausted (Ezzouhairi, 2005).
It is because of being on constant protocol and servicing, packets that may arrive may ultimately or in most cases has to be discarded altogether. Therefore, as this situation occur, a definitive rise in the measurement of loss of packets for the nodes in MANET's is observed (Gui, 2003).
Collision Rate: With the occurrence of these malicious attacks, the nodes then are ought to develop ...