NETA: Evaluating the Effects of NETwork Attacks. MANETs as a Case Study
This work introduces NETA, a novel framework for the simulation of communication networks attacks. It is built on top of the INET framework and the OMNET++ simulator, using the generally accepted implementations of many different protocols, as well as models for mobility, battery consumption, channel errors, etc. NETA is intended to become an useful framework for researchers focused on the network security field. Its flexible design is appropriate for the implementation and evaluation of many types of attacks, doing it accurate for the benchmarking of current defense solutions under same testing conditions or for the development of new defense techniques. As a proof of concept, three different attacks have been implemented in NETA. The capabilities of NETA are exhibited by evaluating the performance of the three implemented attacks under different MANET deployments.
KeywordsNetwork simulation network attacks
Unable to display preview. Download preview PDF.
- 1.Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: Dos attacks in mobile ad hoc networks: A survey. In: Proceedings of the 2012 2nd International Conference on Advanced Computing & Communication Technologies, ACCT, pp. 535–541. IEEE Computer Society (January 2012)Google Scholar
- 3.Network Engineering Security Group (NESG): NETA: NETwork Attacks Framework for OMNeT++, http://nesg.ugr.es/index.php/en/neta (accessed April 25, 2013)
- 4.Lessmann, J., Janacik, P., Lachev, L., Orfanus, D.: Comparative study of wireless network simulators. In: 7th International Conference on Networking, ICN, pp. 517–523. IEEE Computer Society (April 2008)Google Scholar
- 5.ur Rehman Khan, A., Bilal, S.M., Othman, M.: A performance comparison of open source network simulators for wireless networks. In: IEEE International Conference on Control System, Computing and Engineering, ICCSCE, pp. 34–38. IEEE Computer Society (November 2012)Google Scholar
- 6.Kumar, A., Kaushik, S., Sharma, R., Raj, P.: Simulators for wireless networks: A comparative study. In: International Conference on Computing Sciences, ICCS, pp. 338–342. IEEE Computer Society (September 2012)Google Scholar
- 7.Ehsan, H., Khan, F.: Malicious AODV: implementation and analysis of routing attacks in MANETs. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom, pp. 1181–1187. IEEE Computer Society (June 2012)Google Scholar
- 8.Gamer, T., Scharf, M.: Realistic simulation environments for IP-based networks. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops. SIMUTools, pp. 83:1–83:7. ACM (March 2008)Google Scholar
- 9.Dini, G., Tiloca, M.: ASF: an attack simulation framework for wireless sensor networks. In: IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob, pp. 203–210. IEEE Computer Society (October 2012)Google Scholar