TY - GEN
T1 - Mitigation and Detection Strategy of DoS Attack on Wireless Sensor Network Using Blocking Approach and Intrusion Detection System
AU - Kurniawan, Mochamad Teguh
AU - Yazid, Setiadi
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - Wireless Sensor Network (WSN) has a big role in several fields such as military, health and even information technology such as IoT (Internet of Things). Besides having many benefits, WSN has a disadvantage in its application where there is no built-in security system embedded in the sensor device due to limitations possessed by sensor nodes such as memory, processor, and battery. As a result, WSN is vulnerable to attacks, one of the main attacks on WSN is the DoS attack. DoS attacks aim to prevent users legitimate from using resources by reducing existing resources until the network resources are busy, the network becomes slow until finally off. So, we need to detect, mitigate DoS attacks that these attacks can be stopped. In this study, the method of detecting and mitigating DoS attacks uses a signature-based Intrusion Detection System (IDS) by implementing a blocking approach on the attack node by blocking all packets originating from the attacker until the attacker runs out of energy. The blocking approach was successfully implemented on the WSN network when IDS detected a DoS attack. So, the method of blocking approach can be used as a mitigation of DoS attacks by blocking all packets sourced from the attacker.
AB - Wireless Sensor Network (WSN) has a big role in several fields such as military, health and even information technology such as IoT (Internet of Things). Besides having many benefits, WSN has a disadvantage in its application where there is no built-in security system embedded in the sensor device due to limitations possessed by sensor nodes such as memory, processor, and battery. As a result, WSN is vulnerable to attacks, one of the main attacks on WSN is the DoS attack. DoS attacks aim to prevent users legitimate from using resources by reducing existing resources until the network resources are busy, the network becomes slow until finally off. So, we need to detect, mitigate DoS attacks that these attacks can be stopped. In this study, the method of detecting and mitigating DoS attacks uses a signature-based Intrusion Detection System (IDS) by implementing a blocking approach on the attack node by blocking all packets originating from the attacker until the attacker runs out of energy. The blocking approach was successfully implemented on the WSN network when IDS detected a DoS attack. So, the method of blocking approach can be used as a mitigation of DoS attacks by blocking all packets sourced from the attacker.
KW - blocking approach
KW - DoS Attack
KW - Signature-based IDS
KW - WSN
UR - http://www.scopus.com/inward/record.url?scp=85091901683&partnerID=8YFLogxK
U2 - 10.1109/ICECCE49384.2020.9179255
DO - 10.1109/ICECCE49384.2020.9179255
M3 - Conference contribution
AN - SCOPUS:85091901683
T3 - 2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020
BT - 2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2020
Y2 - 12 June 2020 through 13 June 2020
ER -