نتایج جستجو برای: routing attacks
تعداد نتایج: 109208 فیلتر نتایج به سال:
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the implementation and experiments of the JiNao’s statistical intrusion detection module. Our implementation is based upon the algorithm developed in SRI’s NIDES (Next-generation Intrusion Detection Expert System) project. Some...
In sensor networks, nodes cooperatively work to collect data and forward it to the final destination. Many protocols have been proposed in the literature to provide routing and secure routing for ad hoc and sensor networks, but these protocols either very expensive to be used in very resource-limited environments such as sensor networks, or suffer from the lack of one or more security guarantee...
Open Shortest Path First (OSPF) is the most widely deployed interior gateway routing protocol on the Internet. We present two new attacks on OSPF that expose design vulnerabilities in the protocol specification. These new attacks can affect routing advertisements of routers not controlled by the attacker while evading the OSPF self-defense “fight-back” mechanism. By exploiting these vulnerabili...
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbour relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits th...
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that ca...
Low-power wireless networks are an exciting research direction in sensing and widespread figuring out/calculating. Prior security work in this area has focused mostly on denial of communication at the routing or medium access control levels. This paper explores useful thing/valuable supply using everything up (completely) attacks at the routing rules of conduct layer, which permanently disable ...
The infrastructure of a Mobile Adhoc Network (MANET) has no routers for routing and all nodes must share the same routing protocol to assist each other while transmitting messages. Almost all common routing protocols at present consider performance as first priority and have little defense capability against the malicious nodes. Many researchers have proposed protocols of higher safety to defen...
Mobile ad hoc networks (MANETs) are vulnerable to a myriad of attacks. Purely cryptographic countermeasures are effective against outsiders, but not non-cooperative members including selfish and compromised members. Noncryptographic means like intrusion detection must be devised to answer the challenge. However, as recently studied in “jellyfish attack” [1], the effectiveness of wireless intrus...
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that ca...
MANET is a self configuring and centralized multi hop wireless network. Adhoc achieve efficient routing but due to high mobility network can change the structure dynamically so route may be disconnected and route selection, route combinations are not an easy issue to solve. Especially detecting vulnerable node to both internal and external attacks are challenging and major issue in the Adhoc ne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید