{"title":"在manet中MrDR方法对抗不同DoS攻击的比较","authors":"Albandari Alsumayt, J. Haggerty, Ahmad Lotfi","doi":"10.1109/ICDIPC.2015.7323032","DOIUrl":null,"url":null,"abstract":"A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect, Rehabilitate (MrDR) method, which is applied to detect three types of DoS attacks: wormhole; greyhole; and jellyfish attacks is an effective mechanism for dealing with them. The Network Simulator (NS2) was used to test the efficiency of the MrDR method and the results show that it works better for greyhole attacks than wormhole attacks, and it works least well in the case of jellyfish attacks.","PeriodicalId":339685,"journal":{"name":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Comparison of the MrDR method against different DoS attacks in MANETs\",\"authors\":\"Albandari Alsumayt, J. Haggerty, Ahmad Lotfi\",\"doi\":\"10.1109/ICDIPC.2015.7323032\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect, Rehabilitate (MrDR) method, which is applied to detect three types of DoS attacks: wormhole; greyhole; and jellyfish attacks is an effective mechanism for dealing with them. The Network Simulator (NS2) was used to test the efficiency of the MrDR method and the results show that it works better for greyhole attacks than wormhole attacks, and it works least well in the case of jellyfish attacks.\",\"PeriodicalId\":339685,\"journal\":{\"name\":\"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDIPC.2015.7323032\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIPC.2015.7323032","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of the MrDR method against different DoS attacks in MANETs
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect, Rehabilitate (MrDR) method, which is applied to detect three types of DoS attacks: wormhole; greyhole; and jellyfish attacks is an effective mechanism for dealing with them. The Network Simulator (NS2) was used to test the efficiency of the MrDR method and the results show that it works better for greyhole attacks than wormhole attacks, and it works least well in the case of jellyfish attacks.