期刊文献+

非均匀节点分布网络能量空洞攻击抑制仿真 被引量:4

Simulation of Energy Hole Attack Suppression in Non-Uniform Node Distributed Networks
下载PDF
导出
摘要 针对传统非均匀节点分布网络能量空洞攻击抑制方法存在抑制效果差、响应时间长、能量空洞攻击抑制性能较差的问题,提出非均匀节点分布网络能量空洞攻击抑制方法。为了有效识别非均匀节点分布网络能量空洞攻击,需要获取OpenFlow交换机的流表项,分析非均匀节点分布下网络能量空洞攻击的特性,获取和非均匀节点分布网络能量空洞攻击相关的流表特征,根据相关特征的变化,对相关的训练样本进行分类,完成非均匀节点分布网络能量空洞攻击检测;根据检测结果,选用网络半径和数据流量监测,组建非均匀节点分布网络能量空洞攻击抑制模型,通过所组建的模型对不同类型的非均匀节点分布网络能量空洞攻击进行有效抑制。实验结果表明,所提方法的抑制效果较好,在不同节点数量下的响应时间较短,能量空洞攻击抑制性能较强。 In this article, a method to suppress energy hole attacks in non-uniform node distribution network was proposed. In order to effectively identify the energy hole attacks in non-uniform node distribution network, it is necessary to obtain the flow table items of OpenFlow switch and analyze the characteristics of energy hole attack under non-uniform node distribution, so as to find the flow table characteristics related to the energy hole attack in non-uniform node distribution network. According to the changes of relevant characteristics, relevant training samples were classified, and thus to complete the detection of energy hole attacks in non-uniform node distribution network. On the basis of detection results, the network radius and data flow detection were selected to build a suppression model of energy hole attack in non-uniform node distribution network. Finally, different types of energy hole attacks were effectively suppressed by this model. Simulation results show that the proposed method has better suppression effect and shorter response time under different numbers of nodes. Meanwhile, this method has better ability to suppress the energy-hole attacks.
作者 王超 WANG Chao(School of Data Science and Technology,North University of China,Taiyuan Shanxi 030051,China)
出处 《计算机仿真》 北大核心 2020年第4期317-321,共5页 Computer Simulation
关键词 非均匀节点 分布网络 能量 空洞攻击抑制 Nonuniform node Distributed network Energy Hole attack suppression
  • 相关文献

参考文献10

二级参考文献66

  • 1程叶霞,姜文,薛质,程叶坚.基于攻击图模型的多目标网络安全评估研究[J].计算机研究与发展,2012,49(S2):23-31. 被引量:9
  • 2周伟伟,岳云天,郁滨.ZigBee节点多因子身份认证方案研究[J].系统仿真学报,2015,27(4):762-769. 被引量:2
  • 3余荣,孙智,周海军,梅顺良.保证服务质量的最小能量无线传感器网络路由算法[J].清华大学学报(自然科学版),2007,47(10):1634-1637. 被引量:7
  • 4Xiang Y,Li K,Zhou W.Low-rate DDoS attacks detection and traceback by using new information metrics[J].IEEE Transactions on Information Forensics and Security,2011,6(2):426-437.
  • 5Qiao Zhu,Zhang Yizhi,Xie Chuiyi.Research and survey of low-rate denial of service attacks[C]//13th International Conference on Advanced Communication Technology,IEEE,2011:1195-1198.
  • 6Zhang Jing,Hu Huaping,Liu Bo.Robustness of RED in mitigating LDoS attack[J].KSII Transactions on Internet and Information Systems,2011,5(5):1085-1100.
  • 7Mohan L,Bijesh MG,John JK.Survey of low rate denial of service(LDoS)attack on RED and its counter strategies[C]//IEEE International Conference on Computational Intelligence&Computing Research,2012:1-7.
  • 8Wu Zhijun,Zhang Haitao,Wang Minghua,et al.MSABMS-based approach of detecting LDoS attack[J].Computers&Security,2012,31(4):402-417.
  • 9Cheung S,Lindqvist U, Fong M W. Modeling Multistep Cyber Attacks for Scenario Recognition [ C ]//Pro- ceedings of DARPA Information Survivability Con- ference and Exposition. Washington D. C., USA. IEEE Press, 2003 : 284-292.
  • 10Wang L, Noel S, Jajodia S. Minimum-cost Network Hardening Using Attack Graphs [ J 3. Computer Com- munications ,2006,29( 18 ) :3812-3824.

共引文献64

同被引文献31

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部