...
首页> 外文期刊>Wireless communications & mobile computing >FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks
【24h】

FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks

机译:FAPRP:移动临时网络中攻击防爆路由协议的机器学习方法

获取原文

摘要

Request route flooding attack is one of the main challenges in the security of Mobile Ad Hoc Networks (MANETs) as it is easy to initiate and difficult to prevent. A malicious node can launch an attack simply by sending an excessively high number of route request (RREQ) packets or useless data packets to nonexistent destinations. As a result, the network is rendered useless as all its resources are used up to serve this storm of RREQ packets and hence unable to perform its normal routing duty. Most existing research efforts on detecting such a flooding attack use the number of RREQs originated by a node per unit time as the threshold to classify an attacker. These algorithms work to some extent; however, they suffer high misdetection rate and reduce network performance. This paper proposes a new flooding attacks detection algorithm (FADA) for MANETs based on a machine learning approach. The algorithm relies on the route discovery history information of each node to capture similar characteristics and behaviors of nodes belonging to the same class to decide if a node is malicious. The paper also proposes a new flooding attacks prevention routing protocol (FAPRP) by extending the original AODV protocol and integrating FADA algorithm. The performance of the proposed solution is evaluated in terms of successful attack detection ratio, packet delivery ratio, and routing load both in normal and under RREQ attack scenarios using NS2 simulation. The simulation results show that the proposed FAPRP can detect over 99% of RREQ flooding attacks for all scenarios using route discovery frequency vector of sizes larger than 35 and performs better in terms of packet delivery ratio and routing load compared to existing solutions for RREQ flooding attacks.
机译:请求路由洪水攻击是移动临时网络安全性的主要挑战之一,因为它很容易启动和难以防止。恶意节点可以通过发送过多的路由请求(RREQ)数据包或无用的数据包到不存在的目的地来启动攻击。因此,网络呈现无用的网络,因为它的所有资源都被用来为RREQ报文的这种风暴提供服务,因此无法执行其正常的路由义务。在检测此类洪水攻击的大多数现有研究工作都使用每单位时间的节点的RREQ数量作为分类攻击者的阈值。这些算法在某种程度上工作;然而,它们遭受高误差率并降低网络性能。本文提出了一种基于机器学习方法的船只的新洪水攻击检测算法(FADA)。该算法依赖于每个节点的路由发现历史信息,以捕获属于同一类别的节点的类似特征和行为,以确定节点是否是恶意的。本文还通过扩展原始AODV协议和集成FADA算法,提出了一种新的洪水攻击预防路由协议(FAPRP)。在使用NS2仿真的正常和RREQ攻击场景中,在成功的攻击检测比率,分组传递比率和路由负载方面评估所提出的解决方案的性能。仿真结果表明,建议的FAPRP可以使用大于35的大于35的尺寸的路由发现频率矢量检测到超过99%的RREQ洪水攻击,并且与用于RREQ洪水攻击的现有解决方案相比,在数据包传递比率和路由负荷方面更好地执行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号