首页    期刊浏览 2024年11月07日 星期四
登录注册

文章基本信息

  • 标题:A Survey Report on Stealthy Packet Dropping
  • 本地全文:下载
  • 作者:E.S.Phalguna Krishna ; M.Ganesh Karthik ; I.D.Krishna Chandra
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2012
  • 卷号:2
  • 期号:4
  • 出版社:S.S. Mishra
  • 摘要:Stealthy At tacks are routing attacks which "Minimize t he cost t o and vi sibility of the atta cker, but whi ch a re ab out as harmful a s Brute force atta cks. These al low a ski lled but not very powerful atta cker to ta rget communicat ion networks in a way that makes it unlik ely that he gets tra ced and caug ht. Stealthy p acket dro pping i s a suite of fo ur a ttack s misrouting , power cont rol, ident ity d elegation, and coll uding co llision tha t can be easily la unched agai nst mult ihop wi reless ad hoc net work s. St ealthy packet dro pping disrupt s the packet from reaching the destinati on t hrough malicious behavi or at an intermed iate node. Ho wever, the ma licio us node gives the impressi on to it s nei ghbo rs that i t performs the legitimate forwa rding action. Mo reover, a legit imat e no de co mes und er suspicion. A po pula r method for detecting attacks in wireless networks i s behavior-based d etection performed b y norma l netwo rk nodes throug h overhearing the co mmunica tion in their neighb orho od. This leverages the o pen broa dcast na ture of wireless communicat ion. An instant iatio n of this technology i s local monitoring. We show tha t local monitoring, and the wi der class of o verhearing -ba sed detection, cannot det ect st ealthy pa cket drop ping atta cks. Add itionally, it mistakenly detects a nd isolat es a legit imate
  • 关键词:Stea lthy Atta ck; Colluding Coll ision; Identity Del egati on; Pack et Misrouting ; Multiho p wi reless adhoc netwo rks
国家哲学社会科学文献中心版权所有