期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2012
卷号:2
期号:4
出版社:S.S. Mishra
摘要:Stealthy At tacks are routing attacks which "Minimize t he cost t o and vi sibility of the atta cker, but whi ch a re ab out as harmful a s Brute force atta cks. These al low a ski lled but not very powerful atta cker to ta rget communicat ion networks in a way that makes it unlik ely that he gets tra ced and caug ht. Stealthy p acket dro pping i s a suite of fo ur a ttack s misrouting , power cont rol, ident ity d elegation, and coll uding co llision tha t can be easily la unched agai nst mult ihop wi reless ad hoc net work s. St ealthy packet dro pping disrupt s the packet from reaching the destinati on t hrough malicious behavi or at an intermed iate node. Ho wever, the ma licio us node gives the impressi on to it s nei ghbo rs that i t performs the legitimate forwa rding action. Mo reover, a legit imat e no de co mes und er suspicion. A po pula r method for detecting attacks in wireless networks i s behavior-based d etection performed b y norma l netwo rk nodes throug h overhearing the co mmunica tion in their neighb orho od. This leverages the o pen broa dcast na ture of wireless communicat ion. An instant iatio n of this technology i s local monitoring. We show tha t local monitoring, and the wi der class of o verhearing -ba sed detection, cannot det ect st ealthy pa cket drop ping atta cks. Add itionally, it mistakenly detects a nd isolat es a legit imate
关键词:Stea lthy Atta ck; Colluding Coll ision; Identity Del egati on; Pack et Misrouting ; Multiho p wi reless adhoc netwo rks