期刊文献+

MANET中分布式拒绝服务攻击研究综述 被引量:1

Research on distributed denial-of-service attacks in MANET:a survey
下载PDF
导出
摘要 随着移动自组织网络在各个领域内得到广泛的使用,其安全性研究显得越来越重要。DDoS攻击给有线网络造成了很大的威胁,同样也威胁到了移动自组织网络的安全性。由于移动自组织网络和有线网络存在着结构型差异,因此移动自组织网络中的DDoS攻击研究与有线网络中的DDoS攻击研究有较大的不同。论文首先描述了移动自组织网络的安全状况;然后从移动自组织网络的网络架构出发,分别分析移动自组织网络中针对物理层、MAC层、网络层以及传输层的DDoS攻击,同时总结针对不同网络层次的攻击所需要采取的防御措施;最后为移动自组织网络建设过程中就如何防范DDoS攻击提出参考意见。 When the Mobile Ad Hoe Network(MANET) is widely used in many areas nowadays,the research on security of MANET is becoming more and more important.DDoS attacks have brought very serious threats to the MANET,as well as to the wired network.Because of the peculiarity of the MANET,the research for DDoS attacks in MANET is much more different from that in wired network.This paper first describes security problems in MANET,and then lists the DDoS attacks in the physics layer,MAC layer,network layer,and transport layer.At the same time,we also introduce the state of the art of defense mechanisms against the challenge of each kind of DDoS attacks.At last,some instructive suggestions about how to form a secure MANET against the DDoS attacks have been given.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第5期116-119,149,共5页 Computer Engineering and Applications
基金 全国信息安全标准化技术委员会项目支持 复旦大学青年科学基金
关键词 拒绝服务攻击 分布式拒绝服务攻击 移动自组织网络 denial-of-service attack distributed denial-of-service attack mobile Ad hoc network
  • 相关文献

参考文献14

  • 1Muthuprasanna M,Manimaran G.Traceback assisted denial-of-service mitigation in wireline-wireless networks[C]//INFOCOM,2005.
  • 2Mirkovic J,Martin J,Reiher P.A taxonomy of DDoS attacks and DDoS defense mechanisms[J].ACM SIGCOMM Computer Communication Review,2004.
  • 3徐恪,徐明伟,吴建平.分布式拒绝服务攻击研究综述[J].小型微型计算机系统,2004,25(3):337-346. 被引量:33
  • 4Geng Xian-jun,Huang Yun,Whinston A B.Defending wireless infrastructure against the challenge of DDoS attacks[J].Mobile Network and Applications,2002.
  • 5LAN MAN standards committee of IEEE computer society.Draft International Standard ISO/IEC 8802-11 IEEE P802.11[S].1999-01.
  • 6Gupta V,Krishnamurthy S,Faloutsos M.Denial of service attacks al the MAC layer in wireless Ad hoc networks[J].MILCOM,2002.
  • 7Thing V L L,Lee H C J.IP traceback for wireless Ad-hoc Networks[C]//60th IEEE Vehicular Technology Conference,2004-09.
  • 8Kim Yongjin,Sankhla V,Helmy A.Efficient traceback of DoS attacks using small worlds in MANET[C]//IEEE Vehicular Technology Conference (VTC),2004.
  • 9Kim Yongjin,Helmy A.SWAT:small world-based attacker traceback in Ad-hoc networks.IEEE/ACM Mobiquitous,2005.
  • 10Stallings W.无线通信与网络[M].何军,译.北京:清华大学出版社,2004.

二级参考文献36

  • 1[1]Kent S, Atkinson R. Security architecture for the internet protocol[S]. RFC2401, Nov. 1998.
  • 2[2]Harkins D, Carrel D. The internet key exchange(IKE)[S]. RFC2409, Nov. 1998.
  • 3[3]Moore D, Voelker G and Savage S. Inferring internet denial-of-service activity[C]. In Proceeding of 10th USENIX Security Symposium, 2001.
  • 4[4]Computer emergency response team[EB/OL]. Results of Distributed Systems Intruder Tools Workshop. http://www.cert.org/reports/dist-workshop-final.html, Nov. 1999.
  • 5[5][EB/OL].http://arbornetworks.com/
  • 6[6][EB/OL].http://www.astanetworks.com/products/vantage/
  • 7[7][EB/OL].http://www.entercept.com/products/
  • 8[8][EB/OL].http://www.mazunetworks.com/solutions/product-overview.html
  • 9[9]Rocky K C Chang. Defending against flooding-based distributed denial-of-service attacks: a tutorial[J]. IEEE Communications Magazine, October 2002.
  • 10[10]Jon Postel. Transmission control protocol[S]. RFC793, September 1981.

共引文献35

同被引文献29

  • 1毛健,周玉洁.可信平台芯片的一种硬件攻击防范设计[J].信息技术,2006,30(6):27-29. 被引量:2
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3Qusay H Mahmoud. Cognitive Networks:Towards Self- Aware Networks [ M ]. New York : Wiley, 2007 : 279 - 288.
  • 4Maxim Raya, Jean - Pierre Hubaux. Securing vehicular ad hoc networks [ J ]. Journal of Computer Security, 2007 (15) :39 -68.
  • 5Jeremy Blum, Azim Eskandarian. The threat of intelligent collisions [J]. IT Professional, 2004, 6( 1 ) : 24 -29.
  • 6Matthias Gerlach. VaneSe- An approach to VANET security[ C]//Proceedings of V2VCOM. San Diego, California, USA, 2005.
  • 7Jean -Pierre Hubaux, Srdjan Capkun,Jun Luo. The security and privacy of smart vehicles [ J ]. IEEE Security and Privacy Magazine, 2004, 2( 3 ) : 49 - 55.
  • 8Bryan Parno, Adrian Perrig. Challenges in securing vehicular networks[ C ]///Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, USA, 2005.
  • 9Olivier Dousse, Baccelli F, Patrick Thiran. Impact of Interferences on Connectivity in Ad Hoc Networks [ J ]. IEEE/ACM TRANSACTIONS ON NETWORKING, 2005, 13(2) :425 -436.
  • 10Wang Nengwen, Huang Yuemin, Chen Weiming. A novel secure communication scheme in vehicular ad hoc networks[ J]. Computer Communications, 2008 ( 1 ) : 12 - 24.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部