Anomaly Detection in Cyber Physical Systems

Size: px
Start display at page:

Download "Anomaly Detection in Cyber Physical Systems"

Transcription

1 Anomaly Detection in Cyber Physical Systems Maggie Cheng Illinois Institute of Technology December 11, 2018 IEEE Big Data Conference Seattle, WA

2 Outline Introduction Outlier Detection Sequential Change Point Detection Anomaly Identification Introduction 2

3 Types of Anomalies Outliers location outliers scatter outliers Change Points on Time Series continuous beginning of a new trend change of state of the underlying process Introduction 3

4 Change point may not be an outlier Outlier vs. Change Point Pictures/changepoint-eps-converted-to.pdf Outlier may not be a change point Pictures/outlier-eps-converted-to.pdf Introduction 4

5 Outline Introduction Outlier Detection Sequential Change Point Detection Anomaly Identification Outlier Detection 5

6 Detection Techniques Statistical outlier detection (Barnett and Lewis 1994) Projection-based outlier detection Distance-based outlier detection (Knorr and Ng 1998) - based on notion of proximity - high-dimensional data: notion of proximity ( ) - sparsity makes every data point an outlier Outlier Detection Algorithms for High-Dimensional Data Naïve brute force: exhaustive search (Slow!) Principle components (for dimension reduction) Outlier Detection 6

7 Outline Introduction Outlier Detection Sequential Change Point Detection Anomaly Identification Sequential Change Point Detection 7

8 Sequential Change Point Detection Sequential Change Point Detection To detect a change point in a time series {X 1, X 2,..., X n }, it is assumed that the pre-change density is f 0, and if a change occurs at time ν, then the post-change density becomes f 1 beginning from moment ν + 1. The hypotheses are then formulated as: H 0 : {X 1, X 2,..., X n } f 0 H 1 : {X 1, X 2,..., X ν } f 0, and {X ν+1, X ν+2,..., X n } f 1 The Change Point Detection Problem is to decide (1) which hypothesis is true? (2) if H 1 is true, ν =? The time instance ν, at which the state of the process changes is referred to as the change point or time of change. Sequential Change Point Detection 8

9 Sequential Change Point Detection Algorithms Cumulative Sum Algorithm (CUSUM) Shiryaev-Roberts Procedure Sliding Window Algorithm Performance Metrics False positive and false negative rates - If a change occurred but the detection procedure failed to detect it: false negative (misdetection) - If the detection time N < ν: false positive (false alarm) Detection delay - If there is a true change and the time of change is ν, the detection time is N, then detection delay τ = N ν Sequential Change Point Detection 9

10 CUSUM (Page, 1954) Optimality CUSUM is optimal in the sense of minimizing worst case detection delay. Assumptions Observations X 1, X 2,... X n are independent, iid pre-change and iid post-change Probability density functions: f 0 before change; f 1 after change Assume f 0 and f 1 are known The only thing unknown is ν, the time of change Parameter Detection threshold h Sequential Change Point Detection 10

11 CUSUM Parametric CUSUM: Based on Maximum Likelihood Principle Detection statistics: where W 0 = 0 Z n = log L n W n = max(w n 1 + Z n, 0) for n 1 L n is the likelihood ratio: L n = f1(xn Xn 1 1 ), or L f 0(X n X n 1 1 ) n = f1(xn) f 0(X n) for i.i.d. The procedure declares a change as soon as the detection statistics W n exceeds a preset threshold h: N = min{n 1 : W n h} Sequential Change Point Detection 11

12 Shiryaev-Roberts Procedure The Problem Setting Limited to a change of mean or to normal observations Original Setting: Quickest Detection of a Disorder in a Stationary Regime - Detecting a change in the mean of a Brownian motion - The change is possibly taking place at a far horizon A randomized version for a general discrete time setting - Brownian motion techniques are not applicable in discrete time Applications: target detection and tracking, rapid detection of intrusions in communication networks, environmental monitoring - Early detection of changes that may occur in a distinct future Sequential Change Point Detection 12

13 Shiryaev-Roberts Procedure The Algorithm 1. Shiryaev-Roberts statistic R n = n k=1 2. From independence assumption: R n = n p(x 1,...,X n ν=k) p(x 1,...,X n ν= ) n f 1(X i) f 0(X i) k=1 i=k 3. R n can be computed recursively: R n = (1 + R n 1 ) f1(xn) f 0(X n), for n 1; R 0 = 0 4. Stopping time: R AB = min{n 1 : R n A B } Parameter: A B is chosen such that E N AB = B B is a preset value before surveillance begins. Sequential Change Point Detection 13

14 Shiryaev-Roberts Procedure Detection Delay Shiryaev-Roberts procedure is the best in terms of minimizing the expected detection delay (asymptotically). Theorem Shiryaev-Roberts procedure minimizes E k (N k) + k=1 over all stopping times N that satisfy E (N) B. CUSUM and S-R Procedure Based on ratio of likelihoods - S-R procedure is a CUSUM-type of algorithm Difficult to apply when f 1 and f 0 are unknown Sequential Change Point Detection 14

15 Preset Parameters Sliding Window Algorithm window size m (m N, the total number of data points) the level of significance α (e.g., α = 0.05) Sliding Window Algorithm (Cheng & Wu, 2016) 1. Set window offset d = Compute the sum S 1 = d+m i=d+1 X i, and S 2 = d+2m i=d+m+1 X i. 3. If S 2 S 1 zσ 2m, declare a change point ˆν = d + m 4. Else set d = d + 1, go to line 2. Remarks: z is the critical value that provides an area of α in the upper tail of the standard normal distribution. σ 2 is the variance, updated as the window moves Sequential Change Point Detection 15

16 Sliding Window Algorithm Algorithm Properties Be able to detect a change in state without knowing the actual preand post- change densities Relate detection threshold to a tolerable false alarm rate controlled trade-off Relate detection threshold to the dynamic characteristics of the data and not use a preset value Be able to detect abrupt changes as well as slow and subtle changes Avoid mistaking an isolated outlier as a change for a new state Sequential Change Point Detection 16

17 Applications Using Sequential Change Point Detection DoS Attack Detection Attack Detection in Wireless Networks Power Grid Anomaly Detection Sequential Change Point Detection 17

18 DoS Attack Detection A Common DoS Attack: SYN Flood Attack Attacker sends control packets to compromised nodes A large number of flooding sources send an excessive number of SYN requests to the victim The victim server returns SYN/ACK packet to the client waiting for ACK until timeout Flooding sources never return an ACK Exhaust the victim server s backlog queue all connection requests dropped Challenges: preset threshold ( ) Traffic patterns vary from site to site, from time to time Per-flow state information not known Normal traffic models hard to define Sequential Change Point Detection 18

19 DoS Attack Detection How to detect w/o prior knowledge of flow and traffic info? Detection mechanism must be insensitive to site and traffic patterns. There is no normal traffic model or flow rate, but there is normal behavior Baseline: protocol behavior (TCP connection management) - Normal: FINs match with SYN requests from clients - Packet drop/retransmission cause small discrepancy - Under SYN flood attack: Large difference between the number of SYNs and FINs received Sequential Change Point Detection 19

20 SYN Flood Attack Attackers create a large number of open connections Change in network measurement: SY N F IN shows abrupt increase Sequential Change Point Detection 20

21 DoS Attack Detection Detection Procedure Monitor the number of SYNs and FINs - at egress router (near the flooding source) - at ingress router (near the victim server) Generate time series on (SYNs FINs) Perform sequential change point detection on time series - Non-parametric version Sequential Change Point Detection 21

22 DoS Attack Detection Non-Parametric CUSUM for Change Point Detection Tunable parameters: a, N Observations: S: number of SYNs; F : number of FINs 1. D n = S n F n 2. R n = α(r n 1 ) + (1 α)f n 3. X n = D n /R n 4. choose constant a > E(X n ) 5. Test statistic: y n = (y n 1 + (X n a)) +, y 0 = 0 6. Detection: first n such that y n > N Remarks Algorithm very sensitive to N and a. Difficulty: determining N and c before monitoring begins. Sequential Change Point Detection 22

23 Wormhole Attack in Wireless Ad Hoc Networks Routing: A category of routing protocols use shortest path routing. Nodes exchange local information and relay to others Nodes collectively decide a route towards a destination Select the best route based on hop count (shortest path routing) Wormhole Attack Adversary controls two end points and a tunnel between them Attract traffic to go through the controlled wormhole tunnel by making false route advertisement a shorter path towards a destination Consequences of a Wormhole Attack Route changes not necessarily for the better Further damage: other attacks possible after a wormhole tunnel is established Drop packets, launch a denial of service attack, or gain unauthorized access to other information, etc. Sequential Change Point Detection 23

24 In-Band vs. Out-Band Wormhole Attack In-Band Wormhole Attack Wormhole tunnel consists of other wireless nodes controlled by the adversary Re-routed packets go through these wireless nodes Out-Band Wormhole Attack Wormhole tunnel is an external link A wired link A wireless link (e.g., a long-range directional link) A B A B This talk: address in-band wormhole attack Sequential Change Point Detection 24

25 Wormhole Attack Detection Performance Degradation in an In-Band Wormhole Attack End-to-end Delay increases Throughput decreases Packet Deliver Ratio drops (If the wormhole endpoints drops packets arbitrarily) and more... Detection Logic If a route change (to the shorter one) is coupled with an abrupt increase in end-to-end delay, it is very likely the packets are detoured to go through an in-band wormhole tunnel. In a non-attack scenario, changing to a shorter route is often coupled with decreased delay Proposed Method Model end-to-end delay of a flow as a time series Detect changes in the delay time series at the moment of attack Use a Change Point Detection method to detect the change Sequential Change Point Detection 25

26 Stationary Network Setup An in-band wormhole tunnel is established between node 1 and node 2 at 50 seconds. wormhole tunnel: advertised as one hop 1-2 Two flows, without other traffic in the background Flow 18 28: Before 50 seconds: use path After 50 seconds: use path Flow 17 38: Before 50 seconds: use path After 50 seconds: use path Sequential Change Point Detection 26

27 Stationary Network Result I End to end Delay (seconds) Simulation Time (seconds) Sequential Change Point Detection 27

28 Stationary Network Result II Three flows that changed routes: 9 2, 18 28, There are other flows in the background that stayed on the original routes End to end Delay (s) End to end Delay (s) Simulation Time (s) Simulation Time (s) Figure: Packet size 256B, interval=0.01s, 0.025s Figure: Packet size 256B, interval=0.02s, 0.01s Sequential Change Point Detection 28

29 Mobile Network Setup Mobility Model All nodes are wandering within a small range around their original positions using the random walk 2d mobility model. Case Study A benign case, node 1 are node 2 move towards each other, no wormhole attack. Route change is caused by node mobility, and the actual path length is indeed decreased. An attack case, node 1 and node 2 start a wormhole tunnel. Route change is caused by wormhole, and the actual length is increased while it is believed to be decreased. Sequential Change Point Detection 29

30 Mobile Network Result End to end Delay (seconds) End to end Delay (seconds) Simulation Time (seconds) Simulation Time (seconds) Figure: Benign case: nodes 1 and 2 are moving towards each other. Figure: Attack case: nodes 1 and 2 start a wormhole tunnel. Sequential Change Point Detection 30

31 MAC-Layer Attack Detection in Wireless Networks IEEE MAC CSMA/CA RTS-CTS-DATA-ACK Sequential Change Point Detection 31

32 MAC Layer Misbehavior in IEEE Networks Sender Selfish Behavior Manipulation on carrier sense time Manipulation on back-off value during contention Consequences Channel-capturing effect: other nodes have less chance to transmit Receiver Selfish Behavior RTS dropping attack Consequences Clear channel for itself Sender waste resource retransmit RTS Sequential Change Point Detection 32

33 MAC Layer Misbehavior Detection Other Flows Experience Performance Degradation End-to-end delay increases Throughput decreases Packet interval increases Attack Case vs Non-Attack Case If the trend of change in end-to-end delay (throughput, packet interval, etc) is not the same for everyone, it is likely someone is acting selfishly In a non-attack scenario, increased traffic degrades performance, and has the same effect on everyone Detection Method Monitor packets received Compute per-flow end-to-end delay (or throughput, packet interval) as a time series Use the sliding window change point detection method to detect the change on time series Sequential Change Point Detection 33

34 Simulation Setup Case 1: Shorter DIFS attack normal sender: DIFS=SIFS+2 slot-time; attacker: switch to DIFS=SIFS starting at 50s SIFS=10 µs, slot-time=20 µs Case 2: Shorter DIFS and smaller back-off window γ normal sender: following binary exponential back-off, γ [32, 1024] attacker: use fixed γ = 2 Case 3: RTS dropping attack normal receiver: respond CTS for every RTS request attacker: RTS to CTS ratio 20:1 Sequential Change Point Detection 34

35 MAC Layer Misbehavior Detection Results Case 1: Five victim flows 19 1, 14 1, 12 1, 10 1, 6 1 Case 2: Same as case 1 Case 3: 20 2, 11 2, 8 2, 7 2, 5 2 Node 2 is the attacker in all cases Sequential Change Point Detection 35

36 Result I: Case 1 Delay (s) Delay Throughput (kbps) Throughput Simulation Time (seconds) Simulation Time (seconds) (d) Delay (e) Throughput Delay Mean (s) Delay Mean Throughput Mean (kbps) Throughput Mean Simulation Time (seconds) Simulation Time (seconds) (f) µ D (g) µ T Sequential Change Point Detection 36

37 Result II: Case 2 Delay (s) Delay Throughput (kbps) Throughput Simulation Time (seconds) Simulation Time (seconds) (h) Delay (i) Throughput Delay Mean (s) Delay Mean Throughput Mean (kbps) Throughput Mean Simulation Time (seconds) Simulation Time (seconds) (j) µ D (k) µ T Sequential Change Point Detection 37

38 Result III: Case 3 Tx Data Rate (kbps) Tx Data Rate Transmitted Packet Interval (s) Tx Packet Interval Simulation Time (seconds) Simulation Time (seconds) (l) Throughput (m) Packet Interval Tx Data Rate Mean (kbps) Tx Data Rate Mean Tx Packet Interval (s) Cumulative Average Simulation Time (seconds) Simulation Time (seconds) (n) µ T (o) µ I Sequential Change Point Detection 38

39 Jamming Attack Detection in Wireless Networks Attacks All nodes exposed to open medium Jamming signals: using higher transmission power, do not have to follow MAC protocol Legitimate nodes suffer - TDMA: collision, increased packet error rate and drop rate - CSMA: collision, channel capturing Detection Procedure Detect changes from network measurements (delay, throughput, error rate, packet delivery ratio, signal strength, IFS, etc) Distinguish - Jamming weak signals from legitimate nodes - Jamming network congestion among legitimate nodes Sequential Change Point Detection 39

40 Jamming Attack Detection in Wireless Networks Detection Methods Use summary information in a time interval, compare against a preset detection threshold - Not suitable for highly dynamic networks Use change point detection on time series - Test statistic: delay, throughput, received packets IFS e.g.: Throughput when jamming signal duration varies (p) s (q) 0.8s (r) 1.5s Sequential Change Point Detection 40

41 Anomaly Detection in Power Grids Types of Anomalies Line outage - wild animals - weather - over-grown trees - coupled with aging infrastructure + lack of maintenance Generator outage Transformer fault Human errors Cyber attacks Sequential Change Point Detection 41

42 Error Detection in Power Grids Methods Detection Based on State Estimation - Least Square, Weighted Least Square Works for measurement errors (bad data detection) Line outage: topology change often causes conforming errors - Errors may go undetected Slow - Not suitable for real-time detection Sequential Change Point Detection 42

43 Error Detection in Power Grids Other Methods: Skip State Estimation Wu & Cheng 2016 real-time anomaly detection + identification in two steps Sequential Change Point Detection 43

44 Change Point Detection in High-Dimensional Data Multi-Stream Change Point Detection Detection Procedure Sequential Change Point Detection 44

45 Outline Introduction Outlier Detection Sequential Change Point Detection Anomaly Identification Anomaly Identification 45

46 Challenges Missing Data or Gappy Data Detection with Missing Data Anomaly Identification 46

47 Challenges High-Dimensional, Heterogeneous Data with Lead and Lag Anomaly Identification 47

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #12 MAC Misbehavior 1 IEEE 802.11 Infrastructure mode Many stations share an AP connected to Internet Distributed coordination function

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #9 MAC Misbehavior; OMNET++ Tutorial II 1 Reminder: Assignments Assignment #2 is due today 11:59pm PST Assignment #3 is posted, due March 5 It's

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare (adwait@wpi.edu) Suvesh Pratapa (suveshp@wpi.edu) Modified by

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ISSN: 2229-6948 (ONLINE) ICTACT JOURNAL OF COMMUNICATION TECHNOLOGY, JUNE 2010, VOLUME: 01, ISSUE: 02 DOI: 10.21917/ijct.2010.0013 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Multimedia Communication Services Traffic Modeling and Streaming

Multimedia Communication Services Traffic Modeling and Streaming Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP

More information

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. CS118 Discussion 1A, Week 9 Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m. 1 Outline Wireless: 802.11 Mobile IP Cellular Networks: LTE Sample final 2 Wireless and Mobile Network Wireless access: WIFI

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Attacks on WLAN Alessandro Redondi

Attacks on WLAN Alessandro Redondi Attacks on WLAN Alessandro Redondi Disclaimer Under the Criminal Italian Code, articles 340, 617, 617 bis: Up to 1 year of jail for interrupting public service 6 months to 4 years of jail for installing

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN ------------------- CHAPTER 4 DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN In this chapter, MAC layer based defense architecture for RoQ attacks in Wireless LAN

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

DEPARTMENT OF EECS MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz III. December 18, 2012

DEPARTMENT OF EECS MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz III. December 18, 2012 6.02 Fall 2012, Quiz 3 Page1of13 Name: DEPARTMENT OF EECS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.02 Fall 2012 Quiz III December 18, 2012 your section Section Time Recitation Instructor TA D 1 10-11 Victor

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

EEL6951 Project: Simulation of LDoS Attack in Ad-hoc Network by Y. He et al. I. Introduction

EEL6951 Project: Simulation of LDoS Attack in Ad-hoc Network by Y. He et al. I. Introduction EEL6951 Project: Simulation of LDoS Attack in Ad-hoc Network by Y. He et al. By Paul Muri, Carlo Pascoe, and Brian Sapp I. Introduction Research Paper: LDoS Attack in Ad-hoc Network by Y. He et al. Citation:

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS 1 Sunil Kumar, 2 Er.Vinod Kumar Sharma Abstract-The wireless mesh networks consist of number of number that is connected to

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012 1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Grade: MC: 7: 8: 9: 10: 11: 12: 13: 14: Total: CS244a: An Introduction to Computer Networks Final Exam: Wednesday You are allowed 2 hours to complete this exam. (i) This exam is closed book and closed

More information

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks

Revealing the problems with medium access control protocol in multi hop wireless ad hoc networks Revealing the problems with 802.11 medium access control protocol in multi hop wireless ad hoc networks Authors: Shugong Xo and Tarek Saadawi Presented by Jani Hautakorpi 1 / 28 Content Introduction Overview

More information

End-to-End Mechanisms for QoS Support in Wireless Networks

End-to-End Mechanisms for QoS Support in Wireless Networks End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Internet Protocol and Transmission Control Protocol

Internet Protocol and Transmission Control Protocol Internet Protocol and Transmission Control Protocol CMSC 414 November 13, 2017 Internet Protcol Recall: 4-bit version 4-bit hdr len 8-bit type of service 16-bit total length (bytes) 8-bit TTL 16-bit identification

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Attackers. Abstract. probabilistic distributed MAC protocol, we focus our analysis on the IEEE MAC. Keywords

Attackers. Abstract. probabilistic distributed MAC protocol, we focus our analysis on the IEEE MAC. Keywords Detecting IEEE 802.11 MAC Layer Misbehavior in Ad Hoc Networks: Robust Strategies Against Individual and Colluding Attackers Svetlana Radosavac University of Maryland, College Park John S. Baras University

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract Alvaro A. Cardenas, Vahid Ramezani, John S. Baras Department of Electrical and Computer Engineering and Institute for

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Performance anomaly of b

Performance anomaly of b Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel

More information

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless Wireless Challenges 15-441: Computer Networking Lecture 24: Mobile and Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Force us to rethink many assumptions Need to share airwaves rather

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

On Demand secure routing protocol resilient to Byzantine failures

On Demand secure routing protocol resilient to Byzantine failures On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

CSMA/CD (Collision Detection)

CSMA/CD (Collision Detection) CSMA/CD (Collision Detection) CD (collision detection): easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: received signal strength overwhelmed

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Stream Control Transmission Protocol

Stream Control Transmission Protocol Chapter 13 Stream Control Transmission Protocol Objectives Upon completion you will be able to: Be able to name and understand the services offered by SCTP Understand SCTP s flow and error control and

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information