Show simple item record

dc.contributor.advisorGopinath, K
dc.contributor.authorKumar, Manish C
dc.date.accessioned2010-07-26T08:49:27Z
dc.date.accessioned2018-07-31T04:39:52Z
dc.date.available2010-07-26T08:49:27Z
dc.date.available2018-07-31T04:39:52Z
dc.date.issued2010-07-26
dc.date.submitted2008
dc.identifier.urihttps://etd.iisc.ac.in/handle/2005/791
dc.description.abstractDenial-of-Service (DoS) attacks form a very important category of security threats that are possible in MIPv6 (Mobile Internet Protocol version 6). This thesis proposes a scheme for participants (Mobile Node, Home Agent, and Correspondent Node) in MIPv6 to recover from DoS attacks in the event of any of them being subjected to a DoS attack. We propose a threshold based scheme for participants in MIPv6 to detect presence of DoS attacks and to recover from DoS attacks in the event of any of them being subjected to a DoS attack. This is achieved using an infrastructure for MIPv6 that makes such a solution practical even in the absence of IPsec infrastructure. We propose a protocol that uses concepts like Cryptographically Generated Addresses (CGA), short-term IP addresses using a Lamport hash like mechanism and a hierarchy based trust management infrastructure for key distribution. However, reasoning about correctness of such protocols is not trivial. In addition, new solutions to mitigate attacks may need to be deployed in the network on a frequent basis as and when attacks are detected, as it is practically impossible to anticipate all attacks and provide solutions in advance. This makes it necessary to validate solutions in a timely manner before deployment in real network. However, threshold schemes needed in group protocols make analysis complex. Model checking threshold-based group protocols that employ cryptography have been not successful so far. The testing in a real network or a test bed also will not be feasible if faster and frequent deployment of DoS mitigation solutions is needed. Hence, there is a need for an approach that lies between automated/manual verification and an actual implementation. It is evident from existing literature that not many simulations for doing security analysis of MIP/MIPv6 have been done. This research is a step in that direction. We propose a simulation based approach for validation using a tool called FRAMOGR [40] that supports executable specification of group protocols that use cryptography. FRAMOGR allows one to specify attackers and track probability distributions of values or paths. This work deals with simulation of DoS attacks and their mitigation solutions for MIP in FRAMOGR. This makes validation of solutions possible without mandating a complete deployment of the protocol to detect vulnerabilities in a solution. This does away with the need for a formal theoretical verification of a DoS mitigation solution. In the course of this work, some DoS attacks and recovery mechanisms are simulated and validated using FRAMOGR. We obtained encouraging results for the performance of the detection scheme. We believe that infrastructure such as FRAMOGR would be required in future for validating new group based threshold protocols that are needed for making MIPv6 more robust.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesG22342en_US
dc.subjectMobile Internet Protocolen_US
dc.subjectComputer Access Controlen_US
dc.subjectComputer Securityen_US
dc.subjectFRAMOGRen_US
dc.subjectDenial-of-Service (DoS) Attacksen_US
dc.subjectMIPv6 (Mobile Internet Protocol version 6)en_US
dc.subject.classificationCommunication Engineeringen_US
dc.titleRecovery From DoS Attacks In MIPv6 : Modelling And Validationen_US
dc.typeThesisen_US
dc.degree.nameMSc Enggen_US
dc.degree.levelMastersen_US
dc.degree.disciplineFaculty of Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record