首页> 外文期刊>Expert Systems with Application >Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks
【24h】

Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks

机译:改进的搜索方法,用于评估耐延迟网络共谋强大的异构攻击的脆弱性

获取原文
获取原文并翻译 | 示例
           

摘要

Increasingly more digital communication is routed among wireless, mobile computers over ad-hoc, unsecured communication channels. In this paper, we design two stochastic search algorithms (a greedy heuristic, and an evolutionary algorithm) which automatically search for strong insider attack methods against a given ad-hoc, delay-tolerant communication protocol, and thus expose its weaknesses. To assess their performance, we apply the two algorithms to two simulated, large-scale mobile scenarios (of different route morphology) with 200 nodes having free range of movement. We investigate a choice of two standard attack strategies (dropping messages and flooding the network), and four delay-tolerant routing protocols: First Contact, Epidemic, Spray and Wait, and MaxProp. We find dramatic drops in performance: replicative protocols (Epidemic, Spray and Wait, MaxProp), formerly deemed resilient, are compromised to different degrees (delivery rates between 24% and 87%), while a forwarding protocol (First Contact) is shown to drop delivery rates to under 5% - in all cases by well-crafted attack strategies and with an attacker group of size less than 10% the total network size. Overall, we show that the two proposed methods combined constitute an effective means to discover (at design-time) and raise awareness about the weaknesses and strengths of existing ad-hoc, delay-tolerant communication protocols against potential malicious cyber-attacks. (C) 2017 Elsevier Ltd. All rights reserved.
机译:越来越多的数字通信通过不安全的临时通信通道在无线移动计算机之间路由。在本文中,我们设计了两种随机搜索算法(一种贪婪的启发式算法和一种进化算法),它们可以针对给定的临时的,可容忍的通信协议自动搜索强大的内部攻击方法,从而揭示其弱点。为了评估它们的性能,我们将这两种算法应用于具有200个节点自由移动范围的两个仿真的大型移动场景(具有不同的路线形态)。我们研究了两种标准攻击策略(丢弃消息和网络泛洪)以及四种延迟容忍的路由协议的选择:首次联系,流行,浪花和等待以及MaxProp。我们发现性能急剧下降:复制协议(Epidemic,Spray和Wait,MaxProp)以前被认为具有弹性,在不同程度上受到损害(交付率在24%到87%之间),而转发协议(首次联系)显示为精心设计的攻击策略将攻击率降低到5%以下,并且攻击者组的规模小于网络总规模的10%。总体而言,我们表明,所提出的两种方法相结合构成了一种有效的手段,可以发现(在设计时)并提高人们对现有的临时的,可容忍的,针对潜在恶意网络攻击的通讯协议的弱点和优势的认识。 (C)2017 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号