全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

网络 MAC层攻击综合检测方法

DOI: 10.3969/j.issn.1006-7043. 201203042

Keywords: 通信技术, 移动自组织网络, 人工免疫, 滑窗双元累积算法, 残差阈值判别法, 基因检测

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对IEEE 802.11协议的MAC层攻击存在多样化、智能化的情况,提出一种基于人工免疫的综合检测方法.针对恶意攻击记录每隔一定时间信道的传帧计数作为特征序列,采用滑窗双元累积算法检测;针对自私性攻击检测区分2种情况,即当检测节点处于饱和状态时,记录每个节点每隔一定时间传帧计数序列,采用残差阈值判别法进行初始检测,将检测到的自私节点的退避时间序列进行记录,并进一步进行编码和基因化处理作为基因检测体;当检测节点处于非饱和状态时采用基于相对位置的子串相关函数基因匹配检测.实验表明,该综合攻击检测方法达到了较低的误判率和较快的检测速度,提高了无线网络的可信性.

References

[1]  KYASANUR P, VAIDYA N. Detection and handling of MAC layer misbehavior in wireless networks[C]// Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN’03). San Francisco: IEEE Press, 2003: 173-183.
[2]  CAGALJ M, GANERIWAL S, AAD I, et al. On selfish behavior in CSMA/CA networks[C]//Proceedings of IEEE Infocom on 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Miami:IEEE Press, 2005: 2513-2524.
[3]  RADOSAVAC S, BARAS J S, KOUTSOPOULOS I. A framework for MAC protocol misbehavior detection in wireless networks[C]//Proceedings of the 4th ACM Workshop on Wireless Security. Cologne: ACM Press, 2005: 33-42.
[4]  TOLEDO L, WANG X. Robust detection of selfish misbehavior in wireless network [J]. IEEE Journal on Selected Areas in Communications, 2007, 25(6): 1124-1134.
[5]  刘春风.IEEE802.11无线ad hoc网络MAC层自私行为研究 [D]. 天津:天津大学, 2008: 45-55. LIU Chunfeng. Study of selfish behavior on MAC layer of wireless Ad Hoc networks[D]. Tianjin :Tianjin University, 2008:45-55.
[6]  冷?鹏,李勇,刘科.无线共享信道退避访问攻击的新型检测算法 [J].电子科技大学学报, 2009, 38(5): 644-650. LENG Supeng, LI Yong, LIU Ke. Novel detection scheme for backoff attacks on the shared wireless channel [J].Journal of University of Electronic Science and Technology of China, 2009, 38(5) : 644-650.
[7]  RAYA M, HUBAUX J P, AAD I. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots [C]// Proceedings of the 2nd International Conference on Mobile Systems, Applications and Services. Boston: ACM Press, 2004: 84-97.
[8]  AICKELIN U, BENTLEY P, CAYZER S, et al. Danger theory: the link between ais and ids [C]// Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03). Edinburgh: Springer Press, 2003:147-155.
[9]  AZZEDINE B, RENATO B M, KATHIA R L, et al. An agent based and biological inspired real-time intrusion detection and security model for computer network operations [J]. Computer Communications, 2007, 30(13): 2649-2660.
[10]  GONG Maoguo, JIAO Licheng, ZHANG Lining. Baldwinian learning in clonal selection algorithm for optimization [J]. Information Sciences: an International Journal, 2010, 180(8): 1218-1236.
[11]  WU Xiaonan, BANZHAF W. Review: the use of computational intelligence in intrusion detection systems [J].Applied Soft Computing, 2010, 10 (1): 1-35.
[12]  CHATZIMISIOS P, VITSAS V, BOUCOUVALAS A C. Throughput and delay analysis of the IEEE 802.11 protocol [C]// Proceedings of the 5th IEEE International Workshop on Network Appliances (IWNA’02). Liverpool: IEEE Press, 2002: 168-174.
[13]  ZHAO Yi, TSUNG Fugee, WANG Zhaojun. Dual DCUSUM control scheme for detecting a range of mean shift [J]. IIE Transactions, 2005, 37(11), 1047-1058.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133