模拟分析了自组织路由协议在DDoS攻击下的性能,并提出了解决方案

Ala Mughaid, Ibrahim Obaidat, A. Aljammal, Shadi Alzu'bi, Fatima M. Quiam, Dena Abu Laila, Aseel Al-zou’bi, L. Abualigah
{"title":"模拟分析了自组织路由协议在DDoS攻击下的性能,并提出了解决方案","authors":"Ala Mughaid, Ibrahim Obaidat, A. Aljammal, Shadi Alzu'bi, Fatima M. Quiam, Dena Abu Laila, Aseel Al-zou’bi, L. Abualigah","doi":"10.5267/j.ijdns.2023.2.002","DOIUrl":null,"url":null,"abstract":"Ad hoc networks, known as infrastructure-less networks, are composed of mobile nodes that connect without a centralized system controlling them. These networks have a wide range of potential applications, including emergency response, events, military operations, wireless access, and intelligent transportation. They can take on various forms, such as wireless sensor networks, wireless mesh networks, and mobile ad hoc networks. Because users in these networks can move around at any time, routing protocols must adapt to the constantly changing network layout. However, these networks are also susceptible to various security threats, including DDoS attacks. This paper aims to analyze the performance and impact of security attacks on the performance of reactive and proactive routing protocols in CBR connection patterns with different pause times. The analysis is provided in metrics such as throughput, packet loss, end-to-end delay, and load. The simulation results show that, on average, the OPNET Modeler simulator analyzed the performance results under DDoS attacks under voice and video traffic conditions. Furthermore, the paper explores the use of Honeypot intelligent agents as a solution to increase security by creating a dummy node to fool DDoS attackers. The results show that the OLSR protocol is most affected by DDoS attacks in terms of quality-of-service metrics such as packet loss, throughput, end-to-end delay, and load. The number of responses to the honeypot solutions differs for each protocol.","PeriodicalId":36543,"journal":{"name":"International Journal of Data and Network Science","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution\",\"authors\":\"Ala Mughaid, Ibrahim Obaidat, A. Aljammal, Shadi Alzu'bi, Fatima M. Quiam, Dena Abu Laila, Aseel Al-zou’bi, L. Abualigah\",\"doi\":\"10.5267/j.ijdns.2023.2.002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad hoc networks, known as infrastructure-less networks, are composed of mobile nodes that connect without a centralized system controlling them. These networks have a wide range of potential applications, including emergency response, events, military operations, wireless access, and intelligent transportation. They can take on various forms, such as wireless sensor networks, wireless mesh networks, and mobile ad hoc networks. Because users in these networks can move around at any time, routing protocols must adapt to the constantly changing network layout. However, these networks are also susceptible to various security threats, including DDoS attacks. This paper aims to analyze the performance and impact of security attacks on the performance of reactive and proactive routing protocols in CBR connection patterns with different pause times. The analysis is provided in metrics such as throughput, packet loss, end-to-end delay, and load. The simulation results show that, on average, the OPNET Modeler simulator analyzed the performance results under DDoS attacks under voice and video traffic conditions. Furthermore, the paper explores the use of Honeypot intelligent agents as a solution to increase security by creating a dummy node to fool DDoS attackers. The results show that the OLSR protocol is most affected by DDoS attacks in terms of quality-of-service metrics such as packet loss, throughput, end-to-end delay, and load. The number of responses to the honeypot solutions differs for each protocol.\",\"PeriodicalId\":36543,\"journal\":{\"name\":\"International Journal of Data and Network Science\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Data and Network Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5267/j.ijdns.2023.2.002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Data and Network Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5267/j.ijdns.2023.2.002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 2

摘要

自组织网络,被称为无基础设施网络,由移动节点组成,这些节点在没有集中系统控制的情况下相互连接。这些网络具有广泛的潜在应用,包括应急响应、事件、军事行动、无线接入和智能交通。它们可以采取各种形式,例如无线传感器网络、无线网状网络和移动自组织网络。由于这些网络中的用户可以随时移动,路由协议必须适应不断变化的网络布局。然而,这些网络也容易受到各种安全威胁,包括DDoS攻击。本文旨在分析CBR连接模式中具有不同暂停时间的被动路由协议和主动路由协议的性能以及安全攻击对性能的影响。分析是通过吞吐量、数据包丢失、端到端延迟和负载等指标提供的。仿真结果表明,平均而言,OPNET Modeler模拟器在语音和视频流量条件下分析了DDoS攻击下的性能结果。此外,本文探讨了使用蜜罐智能代理作为一种解决方案,通过创建虚拟节点来欺骗DDoS攻击者来提高安全性。结果表明,就服务质量指标(如数据包丢失、吞吐量、端到端延迟和负载)而言,OLSR协议受DDoS攻击的影响最大。每个协议对蜜罐解决方案的响应数量不同。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution
Ad hoc networks, known as infrastructure-less networks, are composed of mobile nodes that connect without a centralized system controlling them. These networks have a wide range of potential applications, including emergency response, events, military operations, wireless access, and intelligent transportation. They can take on various forms, such as wireless sensor networks, wireless mesh networks, and mobile ad hoc networks. Because users in these networks can move around at any time, routing protocols must adapt to the constantly changing network layout. However, these networks are also susceptible to various security threats, including DDoS attacks. This paper aims to analyze the performance and impact of security attacks on the performance of reactive and proactive routing protocols in CBR connection patterns with different pause times. The analysis is provided in metrics such as throughput, packet loss, end-to-end delay, and load. The simulation results show that, on average, the OPNET Modeler simulator analyzed the performance results under DDoS attacks under voice and video traffic conditions. Furthermore, the paper explores the use of Honeypot intelligent agents as a solution to increase security by creating a dummy node to fool DDoS attackers. The results show that the OLSR protocol is most affected by DDoS attacks in terms of quality-of-service metrics such as packet loss, throughput, end-to-end delay, and load. The number of responses to the honeypot solutions differs for each protocol.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.80
自引率
0.00%
发文量
163
审稿时长
8 weeks
期刊最新文献
Assessing cognitive flexibility: Quantitative insights into the impact of adaptive learning technologies in special education Evaluation of factors affecting university students' satisfaction with e-learning systems used dur-ing Covid-19 crisis: A field study in Jordanian higher education institutions The effect of quality, security and privacy factors on trust and intention to use e-government services The influence of social media marketing activities on customer loyalty: A study of e-commerce industry Exploring the critical success factors of s-commerce in social media platforms: The case of Jordan
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1