Anomaly detection for DOS routing attack by a attack source location method

被引:0
|
作者
HeLiu, A. [1 ]
Zhao, B. Yingjun [1 ]
Dong, C. Qingkuan [2 ]
机构
[1] Air Force Engn Univ, Missile Inst, Xian 710051, Peoples R China
[2] Xian Univ Elect Sci & Technol, Commun Engn, Xian 710071, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a credible routing in Ad Hoc network for DOS attack problems. This paper presents a probabilistic packet marking location technology, describes the source packet marking attack node localization method, and here we build the attack source reliable positioning model based on probabilistic packet marking. In this case, we provide that the data source in Ad Hoc network can back and transmission path can restore, it can be tracked by some behavior of the network user node, information of the sender, forwarding and receiver can deny that the occurrence of data exchange. We also verified the relationship between the success rate of packet marking probability and location. The simulation results show that this method is found in destination node after the DOS attack can date back to the location of the attack source actively.
引用
收藏
页码:25 / 29
页数:5
相关论文
共 50 条
  • [1] A scalable method for router attack detection and location in link state routing
    Chakrabarti, A
    Manimaran, G
    [J]. LCN 2003: 28TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2003, : 293 - 294
  • [2] IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
    Fadhlillah, Aghnia
    Karna, Nyoman
    Irawan, Arif
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 18 - 22
  • [3] An Anomaly Based VoIP DoS Attack Detection and Prevention Method Using Fuzzy Logic
    Hosseinpour, Mahsa
    Moghaddam, Mohammad Hossein Yaghmaee
    Seno, Seyed Amin Hosseini
    Roshkhari, Hossein Khosravi
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 713 - 718
  • [4] An Anomaly Behavior based Detection and Prevention of DoS Attack in IoT Environment
    Kumar, S. Santhosh
    Kulothungan, K.
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 287 - 292
  • [5] An efficient feature reduction method for the detection of DoS attack
    Kshirsagar, Deepak
    Kumar, Sandeep
    [J]. ICT EXPRESS, 2021, 7 (03): : 371 - 375
  • [6] Dynamic entropy based DoS attack detection method
    Zhu Jian-Qi
    Fu Feng
    Yin Ke-xin
    Liu Yan-Heng
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2243 - 2251
  • [7] Network Anomaly Detection Method for Intentional Attack
    Zhao H.
    Zheng C.-Y.
    Wang J.-F.
    Si S.-Z.
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2020, 41 (10): : 1376 - 1381
  • [8] Traffic Deflection Method for DOS Attack Defense using a Location-Based Routing Protocol in the Sensor Network
    Kang, Ho-Seok
    Kim, Sung-Ryul
    Kim, Pankoo
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 685 - 701
  • [9] Source-side DoS Attack Detection with LSTM and Seasonality Embedding
    Yeom, Sungwoong
    Choi, Chulwoong
    Kim, Kyungbaek
    [J]. 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 1130 - 1137
  • [10] A DoS attack detection method based on adversarial neural network
    Li, Yang
    Wu, Haiyan
    [J]. PEERJ COMPUTER SCIENCE, 2024, 10