首页    期刊浏览 2024年11月28日 星期四
登录注册

文章基本信息

  • 标题:Detecting the Active Attacker using Alert Protocol
  • 本地全文:下载
  • 作者:G.Sharmili ; K.Rasila ; P.Renuga R. Senthil Kumar M.E
  • 期刊名称:International Journal of Computer Science and Network Security
  • 印刷版ISSN:1738-7906
  • 出版年度:2015
  • 卷号:15
  • 期号:3
  • 页码:79-81
  • 出版社:International Journal of Computer Science and Network Security
  • 摘要:A packet in ALERT includes the source and destination zones rather than their positions to provide anonymity protection to the source and the goal node. ALERT further enhanced the anonymity protection of source and destination by hiding the data initiator/receiver among a number of data sender/ receivers. It has the apprise and extend mechanism for source anonymity, and uses broadcasting for anonymity to destination. ALERT��s ability to against timing pushattacks and traffic counter attacks is also analyzed. Using TWOAck concept, we can able to detect the selfish and attacker nodes. Source node forwards the Packet to neighbor node, and then, it forwards Packet to node destination. When destination receives Packet, as it is two hops away from Source. Destination is indebted to generate a TWOACK packet, which contains reverse route from source to destination, and sends it back to Source. The retrieval of this TWOACK packet at Source indicates that the transmission of Packet from Source to destination is successful .Otherwise, if this TWOACK packet is not received in a predefined time period, both neighbour and destination nodes are reportedmalicious. The same process applies to every three consecutive nodes along the rest of the route.
  • 关键词:Anonymity;ALERT;TWOACK;Intruder Detection Schema
国家哲学社会科学文献中心版权所有