期刊文献+

基于攻击集的移动自组网MAC层DDoS攻击

DDoS attacks at MAC layer in mobile Ad hoc networks based on attack set
下载PDF
导出
摘要 针对移动自组网IEEE 802.11 MAC协议存在的安全问题,提出一种基于攻击集的DDoS攻击方法。该方法可以准确地攻击目标节点,与传统攻击方式相比不表现出冗余的攻击行为,同时降低攻击行为的检测率。利用NS2仿真平台搭建具有动态拓扑的移动自组织网络仿真场景,在此环境下进行DDoS攻击仿真。模拟结果表明,新的DDoS攻击方法可以有效降低移动自组网的通信能力,且攻击节点分布密度加大将增强攻击效果。 According to the security problem of IEEE 802.11 MAC protocol in mobile Ad hoc networks,this paper proposed a novel DDoS attacks based on attack set which could attack target nodes accurately.Compared with the traditional DDoS attacks methods,it didn't show any redundant attack behaviors and could be effectively avoid being detected.Further more,built the simulation scenario with dynamic topology by simulation platform NS2,in which DDoS attacks was simulated.The simulation results show that the novel DDoS attacks can reduce the communication ability of networks,and the attack effects will be more obvious as the density of attacking nodes is increasing.
出处 《计算机应用研究》 CSCD 北大核心 2011年第3期1148-1151,共4页 Application Research of Computers
基金 国防科技重点实验室基金资助项目(9140C1302010802)
关键词 网络安全 移动自组织网络 媒体接入控制 分布式拒绝服务 攻击集 network security mobile Ad hoc networks media access control distributed denial of service attack set
  • 相关文献

参考文献10

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2SEMIH D.Simulation of black hole attack in wireless Ad hoc networks[D].Ankara:Atilim University,2006.
  • 3YU Wei,LIU K J R.Defense against injecting traffic attacks in wireless mobile Ad hoc networks[J].IEEE Trans on Information Forensics and Security,2007,2(2):227-239.
  • 4王梅,吴蒙.MANET中常见的路由安全威胁及相应解决方案[J].通信学报,2005,26(5):106-112. 被引量:9
  • 5LEI G,ASSI C.Vulnerabilities of Ad hoc network routing protocols to MAC misbehavior[C] //Proc of IEEE International Conference on Wireless and Mobile Computing,Networking and Communications.2005:146-153.
  • 6DJAHEL S,NAIT A F,AHSAN F.Highlighting the effects of joint MAC layer misbehavior and virtual link attack in wireless Ad hoc networks[C] //Proc of IEEE/ACS International Conference on Computer Systems and Applications.2009:756-763.
  • 7BEN Wei,YEUNG D Y,JIN Hai,et al.Pulsing RoQ DDoS attack and defense scheme in mobile Ad hoe networks[J].International Journal of Network Security,2007,4(2):227-234.
  • 8马涛,单洪.移动Ad Hoc网络中DoS攻击的建模与仿真[J].计算机工程,2009,35(5):4-6. 被引量:4
  • 9HONG Xiao-yan,GERLA M,PEI Guang-yu,et al.A group mobility model for Ad hoc wireless networks[C] //Proc of the 2nd ACM International Workshop on Modeling,Analysis and Simulation of Wireless and Mobile Systems.New York:ACM,1999:53-60.
  • 10BIANCHI G.Performance analysis of the IEEE 802.11 distributed coordinated function[J].IEEE Journal on Selected Areas in Communication,2000,18 (3):535-547.

二级参考文献76

  • 1王梅,李娜.入侵检测技术在移动Ad Hoc网络中的应用[J].电子技术(上海),2004,31(8):4-7. 被引量:2
  • 2易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 3Zhou Lidong, Haas Z J. Securing Ad Hoc Networks[J]. IEEE Network, 1999, 13(6): 24-30.
  • 4Zhang Yongguang, Lee Wenke. Intrusion Detection in Wireless Ad Hoc Networks[C]//Proc. of the ACM MOBICOM'00. Boston, MA, USA:[s. n.], 2000.
  • 5Aad I, Hubaux J P, Knightly E W. Denial of Service Resilience in Ad Hoc Networks[C]//Proceedings of MOBICOM'04. Philadelphia, Pennsylvania, USA: [s. n.], 2004.
  • 6Xu Kaixing, Hong Xiaoyan, Gerla M. Landmark Routing in Large Wireless Battlefield Networks Using UAVs[C]//Proceedings of MILCOM'01. Mclean, VA, USA: [s. n.], 2001.
  • 7Baras J S. Modeling and Simulation of Telecommunication Networks for Control and Management[C]//Proc. of the 2003 Winter Simulation Conference. New Orleans, Louisiana, USA: [s. n.], 2003.
  • 8AhleHagh H, Michalson W R. Statistical Characteristics of Wireless Network Traffic and Its Impact on Ad Hoc Network Performance[C}//Proceedings of the Advanced Simulation Technologies Conference. Orlando, USA: [s. n.], 2003.
  • 9P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 10Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.

共引文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部