首页> 外文OA文献 >Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks
【2h】

Improved search methods for assessing Delay-Tolerant Networks vulnerability to colluding strong heterogeneous attacks

机译:改进了评估延迟宽容网络脆弱性的搜索方法,以勾结强异质攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Increasingly more digital communication is routed among wireless, mobile computers over ad-hoc, unsecured communication channels. In this paper, we design two stochastic search algorithms (a greedy heuristic, and an evolutionary algorithm) which automatically search for strong insider attack methods against a given ad-hoc, delay-tolerant communication protocol, and thus expose its weaknesses. To assess their performance, we apply the two algorithms to two simulated, large-scale mobile scenarios (of different route morphology) with 200 nodes having free range of movement. We investigate a choice of two standard attack strategies (dropping messages and flooding the network), and four delay-tolerant routing protocols: First Contact, Epidemic, Spray and Wait, and MaxProp. We find dramatic drops in performance: replicative protocols (Epidemic, Spray and Wait, MaxProp), formerly deemed resilient, are compromised to different degrees (delivery rates between 24% and 87%), while a forwarding protocol (First Contact) is shown to drop delivery rates to under 5% — in all cases by well-crafted attack strategies and with an attacker group of size less than 10% the total network size. Overall, we show that the two proposed methods combined constitute an effective means to discover (at design-time) and raise awareness about the weaknesses and strengths of existing ad-hoc, delay-tolerant communication protocols against potential malicious cyber-attacks.
机译:越来越多的数字通信在ad-hoc,无担保通信通道的无线移动计算机之间路由。在本文中,我们设计了两个随机搜索算法(贪婪启发式和进化算法),它自动搜索针对给定的ad-hoc,延迟通信协议的强大内幕攻击方法,从而暴露其缺点。为了评估其性能,我们将这两个算法应用于两个模拟,大规模的移动方案(不同的路径形态),其中200码具有自由运动范围。我们调查了两个标准攻击策略(丢弃消息和泛滥网络)的选择,以及四个延迟宽容的路由协议:第一次接触,流行病,喷雾和等待以及MAXPROP。我们发现性能下降:复制协议(流行病,喷雾和等待,MAXPROP),以前认为弹性均被损害到不同的程度(24%和87%之间的输送率),而转发协议(第一次接触)显示为通过精心攻击策略和攻击者规模小于10%的攻击率,将交付率降至5%以下 - 在所有情况下。总体而言,我们表明,两种提出的方​​法合并了发现(在设计时)的有效手段,并提高对现有临时频率的弱点和强度,延迟耐受对潜在恶意网络攻击的弱势和优势的认识。

著录项

  • 作者

    Doina Bucur; Giovanni Iacca;

  • 作者单位
  • 年度 2017
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号