Advertisement

NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study

  • Leovigildo Sánchez-Casado
  • Rafael Alejandro Rodríguez-Gómez
  • Roberto Magán-Carrión
  • Gabriel Maciá-Fernández
Part of the Communications in Computer and Information Science book series (CCIS, volume 381)

Abstract

This work introduces NETA, a novel framework for the simulation of communication networks attacks. It is built on top of the INET framework and the OMNET++ simulator, using the generally accepted implementations of many different protocols, as well as models for mobility, battery consumption, channel errors, etc. NETA is intended to become an useful framework for researchers focused on the network security field. Its flexible design is appropriate for the implementation and evaluation of many types of attacks, doing it accurate for the benchmarking of current defense solutions under same testing conditions or for the development of new defense techniques. As a proof of concept, three different attacks have been implemented in NETA. The capabilities of NETA are exhibited by evaluating the performance of the three implemented attacks under different MANET deployments.

Keywords

Network simulation network attacks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: Dos attacks in mobile ad hoc networks: A survey. In: Proceedings of the 2012 2nd International Conference on Advanced Computing & Communication Technologies, ACCT, pp. 535–541. IEEE Computer Society (January 2012)Google Scholar
  2. 2.
    Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)CrossRefGoogle Scholar
  3. 3.
    Network Engineering Security Group (NESG): NETA: NETwork Attacks Framework for OMNeT++, http://nesg.ugr.es/index.php/en/neta (accessed April 25, 2013)
  4. 4.
    Lessmann, J., Janacik, P., Lachev, L., Orfanus, D.: Comparative study of wireless network simulators. In: 7th International Conference on Networking, ICN, pp. 517–523. IEEE Computer Society (April 2008)Google Scholar
  5. 5.
    ur Rehman Khan, A., Bilal, S.M., Othman, M.: A performance comparison of open source network simulators for wireless networks. In: IEEE International Conference on Control System, Computing and Engineering, ICCSCE, pp. 34–38. IEEE Computer Society (November 2012)Google Scholar
  6. 6.
    Kumar, A., Kaushik, S., Sharma, R., Raj, P.: Simulators for wireless networks: A comparative study. In: International Conference on Computing Sciences, ICCS, pp. 338–342. IEEE Computer Society (September 2012)Google Scholar
  7. 7.
    Ehsan, H., Khan, F.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, pp. 1181–1187. IEEE Computer Society (June 2012)Google Scholar
  8. 8.
    Gamer, T., Scharf, M.: Realistic simulation environments for IP-based networks. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops. SIMUTools, pp. 83:1–83:7. ACM (March 2008)Google Scholar
  9. 9.
    Dini, G., Tiloca, M.: ASF: an attack simulation framework for wireless sensor networks. In: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob, pp. 203–210. IEEE Computer Society (October 2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Leovigildo Sánchez-Casado
    • 1
  • Rafael Alejandro Rodríguez-Gómez
    • 1
  • Roberto Magán-Carrión
    • 1
  • Gabriel Maciá-Fernández
    • 1
  1. 1.Dpt. Signal Theory, Telematic and Communications, CITICUniv. of GranadaGranadaSpain

Personalised recommendations