期刊文献+

基于保护流的MANET网MAC层DoS攻击及防御 被引量:3

Protecting Flow Based DoS Attack and Defense at the MAC Layer in MANET
下载PDF
导出
摘要 在分析拒绝报务攻击和IEEE802.11协议的基础上,讨论了无线Ad hoc网络可能遭受的拒绝服务攻击类型。针对其中的MAC层拒绝服务攻击中的协同攻击,重点分析了基于保护流的解决方案。基于该方法的基本原理,提出了保护流位置设计的原则和方法。通过仿真分析在加入保护流前后被攻击流的吞吐量和延时,验证了所提出的保护流位置的设计。 This paper discussed possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks.The protecting flow based solutions were emphatically analyzed with respect to CCA DoS attack at MAC layer.This paper proposed the principles of protecting flow design.By placing protecting flows in different positions,we compared the throughput and delay of these flows being attacked.Simulation results show that the design rule of protecting flow is effective and applicable.
作者 叶进 李伶强
出处 《计算机科学》 CSCD 北大核心 2011年第4期118-121,共4页 Computer Science
基金 国家自然科学基金(60873265) 广西青年科学基金(0832084) 广西重点实验室主任基金(PF090109)资助
关键词 AD HOC MAC层 DOS攻击 保护流 Ad hoc MAC layer DoS attack Protecting flow
  • 相关文献

参考文献6

  • 1Gupta V. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks[C].//Proceedings of MILCOM. 2002:7-10.
  • 2Zhou Yihong, Wu Dapeng, Nettles S M. On MAC-layer denial of service attacks in IEEE 802. 11 ad hoe networks: analysis and counter measures[J]. International Journal of Wireless and Mobile Computing,2006,1(3/4):268-275.
  • 3Tran T M C, Scheuermann B, Mauve M. Detecting the Presence of Nodes in MANETs[C].//Proceedings of the ACM MOBICOM. New York,NY,USA,2007:43-50.
  • 4Mahajan R, Rodrig M, Wetherall D, et al. Analyzing the MAC Level Behavior of Wireless Networks in the Wild[C].//Procee- ding of ACM SIGOCOM. Pisa, Italy, 2006.
  • 5任伟,金海.802.11移动Ad Hoc网络中针对MAC层的分布式拒绝服务攻击[J].计算机安全,2005(10):17-20. 被引量:4
  • 6任伟,刘腾红,金海.移动Ad Hoc网络中针对拥塞的RoQ DDoS攻击及其防御[J].计算机研究与发展,2006,43(11):1927-1932. 被引量:6

二级参考文献9

  • 1M Guirguis,A Bestavros,I Matta,et al.Reduction of quality (RoQ) attacks on Internet end-systems[C].The 24th Annual Joint Conf of the IEEE Computer and Communications Societies (INFOCOM2005),Miami,Florida,2005
  • 2P Gupta,P R Kumar.The capacity of wireless networks[J].IEEE Trans on Information Theory,2000,46(2):388-404
  • 3The Network Simulator NS-2[OL].http://nsnam.isi.edu/nsnam/index.php/Main_Page,2006-03-16
  • 4H Yang,H Luo,F Ye,et al.Security in mobile ad hoc networks:Challenge and solutions[J].IEEE Wireless Communications,2004,11(1):38-47
  • 5Y Zhang,W Lee.Intrusion detection in wireless ad hoc networks[C].In:Proc of the 6th Annual Int'l Conf on Mobile Computing and Networking.New York:ACM Press,2000.275-283
  • 6V Gupta,S Krishnamurthy,M Faloutsos.Denial of service attacks at the MAC layer in wireless ad hoc networks[C].In:Proc of the IEEE MILCOM 2002.Los Alamitos,CA:IEEE Computers Society Press,2002.1118-1123
  • 7G Noubir,G Lin.Low-power DoS attacks in data wireless LANs and countermeasures[J].ACM SIGMOBILE Mobile Computing and Communications Review,2003,7(3):29-30
  • 8I Aad,J P Hubaux,E W Knightly.Denial of service resilience in ad hoc networks[C].In:Proc of the 10th Annual Int'l Conf on Mobile Computing and Networking (MobiCom2004).New York:ACM Press,2004.202-215
  • 9A Kuzmanovic,E W Knightly.Low-rate TCP-targeted denial of service attacks[C].In:Proc of the Conf on Applications,Technologies,Architectures,and Protocols for Computer Communications (SIGCOMM2003).New York:ACM Press,2003.75-86

共引文献6

同被引文献42

  • 1Gupta V, Krishnamurthy S, Faloutsos M. Denial of service at- tacks at the MAC layer in wireless Ad Hoc networks[A]// MILCOME[C]. 2002,2 : 1118-1123.
  • 2Zhou Y,Wu D,Nettles S M. On MAC layer denial of service at- tacks in IEEE 802. 11 ad hoc networks: analysis and eounter measures[J]. International Journal of Wireless and Mobile Com- puting, 2006,1 (3/4) : 268-275.
  • 3Gu Q, Liu P,Chu C H. Defense against packet injection attacks in unreliable Ad Hoe networks[A]//IEEE Global Telecommu- nications Conference[C]. 2005,3.
  • 4Ray S, Starobinski D. On false blocking in RTS/CTS based mul- tihop wireless networks[J]. IEEE Transactions on Vehicular Technology, 2007,56 (2) : 849-862.
  • 5Acharya, Thuente M D. Intelligent jamming attacks, counterat- tacks and(counter)2 attacks in 802. llb Wireless Networks[A]// OPNETWORK-2005 Conference[C]. 2005.
  • 6Karamad E, Ashtiani F. A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside cormnunications[J]. Computer Communications, 2008,1 : 2898-2906.
  • 7Jian Y, Zhang M, Chen SG. Achieving MAC layer fairness in CS- MA/CA networks[J]. IEEE/ACM Transactions on Nnetwor- king, 2011,19 (5) : 1472-1484.
  • 8Xu Kai-xin, Gerla M, Bae S. How effective is the IEEE 802. 11RTS/CTS handshake in Ad Hoc networks[A]//IEEE GLO- BECOM[C]. 2002,1 : 72-76.
  • 9Li Z F,Gupta A K, Nandi S. FMAC/CSR: a fair MAC protocol for wireless Ad-hoc networks[OL], http;/www, ntu. edu. sg/ home5/pgO3802331/papers/fmaccsr%20final, pdf.
  • 10Heusse M,Rousseau F,Guillier R, et al. Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs[J]. ACM SICK;OMM, 2005,35 (4) : 121-132.

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部