【24h】

Hybrid detection of Black hole and gray hole attacks in MANET

机译:疯狂的黑洞和灰洞攻击的混合检测

获取原文

摘要

MANET performance is degraded as a result of Denial-of-service (DoS) attacks such as Black hole and gray hole attacks causing loss of packets. Though many researchers have found different approaches for the effective detection and elimination of these attacks, a single technique to detect both the attacks simultaneously is generally rare. In this paper, a novel hybrid black/gray hole detection approach is proposed for detecting both the black and gray hole attacks in Dynamic Source Routing (DSR) protocol for MANET by using the same technique. DSR protocol dynamically discovers a source route across multiple network hops to any destination in the MANET. In this hybrid approach, the initialized monitor nodes collect the packet flow informations about the neighboring nodes. Then the information distance metric is computed using which two detection thresholds are determined. Then distance metric for all the nodes are compared with the first threshold. If the information distance metric of a node is greater than the first detection threshold, then the node is considered to be malicious nodes. If the information distance metric of the nodes are below the second threshold but not less than the first threshold, the nodes are marked as gray hole attackers while if they are greater than the second threshold, the nodes are marked as black hole attackers. Experimental results show that the proposed hybrid black/gray hole detection approach detects and eliminates the attacks effectively with better throughput, packet drop rate, packet delivery ratio and routing overhead.
机译:由于拒绝服务(DOS)攻击,如黑洞和灰孔攻击导致数据包的丢失,因此MANET性能降低。虽然许多研究人员发现了有效检测和消除这些攻击的不同方法,但同时检测两个攻击的单一技术通常很少见。在本文中,提出了一种新的混合黑色/灰度检测方法,用于通过使用相同的技术检测动态源路由(DSR)协议中的黑色和灰色孔攻击。 DSR协议动态地发现多个网络跳跃的源路由到MANET中的任何目的地。在这种混合方法中,初始化的监视节点收集关于相邻节点的分组流信息。然后计算信息距离度量,使用哪两个检测阈值计算。然后将所有节点的距离度量与第一阈值进行比较。如果节点的信息距离度量大于第一检测阈值,则该节点被认为是恶意节点。如果节点的信息距离低于第二阈值,但不小于第一阈值,则节点被标记为灰度孔攻击器,而如果它们大于第二阈值,则节点被标记为黑洞攻击器。实验结果表明,采用更好的吞吐量,分组跌落率,分组传递比率和路由开销,有效地检测到攻击和消除攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号