Font Size: a A A

Based On Stable Topology In A Manet Ddos Attack Source Tracking Study

Posted on:2013-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:L L ZhangFull Text:PDF
GTID:2248330395950177Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Denial of service (DoS, Denial of Service) attack is one of the major threats to the Internet currently. In DoS attacks, attackers will send so much useless data that the victim could not be capable of providing available services or bandwidth resources are occupied, while the legal user can’t get normal service. Distributed denial of service attacks (DDoS, distributed denial of service) which results from the denial-of-service (DoS) attack is designed to respond the increasing abilities of Victim. In DDoS, Attackers launch so much larger attacks not by themselves but by controlling a large number of puppets hosts that the threat is disruptive. Research on the defense measures of DDoS attack got a lot of results among which attack source traceback technology is the most mature and effective.Attack source traceback refers to the process of locating the attackers and the tracing path by certain technology.Different with traditional wired network and wireless network, MANET (Mobile ad hoc networks) is a multi-hop temporary autonomous system and is made up of some mobile nodes equipped with wireless transmitter-receiver set. The nodes on MANET which play the roles not only host but also routers transfer the data through cooperations. Because of these MANET is more vulnerable to security threats such as eavesdropping, tampering with messages particularly DDoS (Distributed Denial-of-Service) attack. Due to MANET’s own characteristics, the attack source traceback technologies on the Internet can’t be applied directly to MANET. This paper does some research on the attack source traceback on MANET. The major studies of this paper cover the following aspects:1.The thesis describes the research background, purpose and significance.Introduce the principles、classsification and development trends of DDoS. This part focused on analysis of DDoS attack source traceback technologies, including principles of attack source traceback technology、the existing attack traceback methods and detailed comparison of the various tracking methods. And briefly describe the concept、characteristics and topology of MANET. At last, study the attack source traceback on MANET at home and abroad.2. In this paper, IR-AODV protocol which will be able to steady the topology of MANET will be used in attack source traceback. Analyze the design ideas and work processes of IR-AODV. We design the algorithm of attack source traceback on IR-AODV protocol and propose the evaluation of the traceback performace. Then verify the traceable ratio of IR-AODV if higher than AODV through the simulation.3. In order to improve the attack source traceback based on stable topology, this paper propose the enhanced PPM algorithm-IH-PPM (Inhanced PPM).And verify the tracealbe ratio of IH-PPM is higher than PPM through simulation.At last we analyze the security problems of attack source traceback based on stable topology and propose an effective security program.
Keywords/Search Tags:DDoS, MANET, attack source traceback, stable topology, IH-PPM, security
PDF Full Text Request
Related items