O'Reilly logo

Mobile Intelligence by Bala Srinivasan, Ling Tan, Jianhua Ma, Agustinus Borgy Waluyo, Laurence T. Yang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

26.6 THRESHOLD PATTERN MODELING

In the previous section, we have classified wireless sensor networks into three most network topologies based on the data delivery models. In this section, we propose the generation of threshold subpattern values for storage and comparison within the attack detector nodes based on these defined network topologies.

The analytical model of a sensor network undergoing a DDoS attack consists of two types of network traffic, namely, normal and attack. The flow of traffic in a typical sensor network is directed from the sensors to the base station. During normal operations mode, a sensor node may receive traffic from several sources, such as from nodes within its immediate vicinity. The volume of traffic and, in essence, the numbers of traffic flows are higher if the sensor node is a cluster-head or a data aggregation node. The traffic constituting a distributed denial of service attack can also be categorised as a flow, albeit with a different label. We assume that each adversarial node generates a single flow of traffic toward a victim node r. In the presence of attack traffic, the total traffic received by a target node r in a given time epoch, and that needs to be monitored by the attack detection scheme, is given by

images

where images is the normal traffic rate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required