...
首页> 外文期刊>IEEE transactions on mobile computing >Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks
【24h】

Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks

机译:在延迟容忍网络中检测共谋黑洞和灰洞攻击

获取原文
获取原文并翻译 | 示例

摘要

Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to blackhole and greyhole attacks in which malicious nodes intentionally drop all or part of the received messages. Although existing proposals could accurately detect the attack launched by individuals, they fail to tackle the case that malicious nodes cooperate with each other to cheat the defense system. In this paper, we suggest a scheme called Statistical-based Detection of Blackhole and Greyhole attackers (SDBG) to address both individual and collusion attacks. Nodes are required to exchange their encounter record histories, based on which other nodes can evaluate their forwarding behaviors. To detect the individual misbehavior, we define forwarding ratio metrics that can distinguish the behavious of attackers from normal nodes. Malicious nodes might avoid being detected by colluding to manipulate their forwarding ratio metrics. To continuously drop messages and promote the metrics at the same time, attackers need to create fake encounter records frequently and with high forged numbers of sent messages. We exploit the abnormal pattern of appearance frequency and number of sent messages in fake encounters to design a robust algorithm to detect colluding attackers. Extensive simulation shows that our solution can work with various dropping probabilities and different number of attackers per collusion at high accuracy and low false positive.
机译:延迟容忍网络(DTN)的开发是为了应对无线网络中的间歇性连接和长时间延迟。由于连接受限,DTN容易受到黑洞和灰洞攻击的攻击,在这些攻击中,恶意节点有意丢弃所有或部分接收到的消息。尽管现有建议可以准确地检测到由个人发起的攻击,但是它们无法解决恶意节点相互协作以欺骗防御系统的情况。在本文中,我们提出了一种称为“基于统计的黑洞和灰眼攻击者检测(SDBG)”的方案,以解决个人攻击和共谋攻击。要求节点交换其遭遇记录历史记录,其他节点可以根据这些历史记录评估其转发行为。为了检测单个的不当行为,我们定义了转发率指标,可以区分攻击者的行为与正常节点的行为。恶意节点可能通过合谋操纵其转发率指标来避免被检测到。为了连续丢弃消息并提升指标,攻击者需要经常创建伪造的遭遇记录,并伪造大量已发送的消息。我们利用虚假遭遇中出现频率和发送消息数量的异常模式,设计出一种鲁棒的算法来检测共谋攻击者。广泛的仿真表明,我们的解决方案可以以各种准确性和低误报率,在各种串谋中使用各种掉落概率和不同数量的攻击者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号