Stochastic Security Performance of Active Cache Based Defense Against DoS Attacks in Wireless Mesh Network

被引:0
|
作者
Yan, Ye [1 ]
Cao, Jiannong [1 ]
Li, Zhu [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its wireless multi-hop feature, Wireless Mesh Network (WMN) is prone to suffer from many attacks, such as Denial of Service attack(DoS). In the DoS attack, when extortionate high-load flows flood to individual Mesh Routers (MR), they can no longer provide normal services to innocent flows. An active cache based defense solution can detect the existence of attacking flows based on the frequency of incoming packets and eliminate the attacking flows by discarding packets by a Drop Probabiliry(DP). As shown in our simulation study, the selection and variance of DP have a significant impact on the performance of the defense solution to both attacking flows and innocent flows. In this paper a series of DP selection and variance methods are employed in our simulation studies. From them, we can optimize the DP methods and corresponding parameter setting of the solution against Dos attack by the analysis on the simulation results.
引用
收藏
页码:30 / 36
页数:7
相关论文
共 50 条
  • [41] Anomaly-based protection approach against wireless network attacks
    Fayssal, Samer
    Hariri, Salim
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 193 - 195
  • [42] Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
    Misra, Sudip
    Dhurandher, Sanjay K.
    Rayankula, Avanish
    Agrawal, Deepansh
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (02) : 367 - 382
  • [43] Online-Learning-Based Defense Against Jamming Attacks in Multichannel Wireless CPS
    Alipour-Fanid, Amir
    Dabaghchian, Monireh
    Wang, Ning
    Jiao, Long
    Zeng, Kai
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13278 - 13290
  • [44] Agent-based simulation of distributed defense against computer network attacks
    Kotenko, Igor
    Ulanov, Alexander
    20TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2006: MODELLING METHODOLOGIES AND SIMULATION: KEY TECHNOLOGIES IN ACADEMIA AND INDUSTRY, 2006, : 560 - +
  • [45] Reputation-based defense scheme against pollution attacks on network coding
    Wang T.
    Cai Y.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (11): : 2491 - 2499
  • [46] Survey of Practical Security Frameworks for Defending SIP Based VoIP Systems against DoS/DDoS Attacks
    Armoogum, Sheeba
    Mohamudally, Nawaz
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [47] Research on Wireless-Based Intrusion Detection in Mesh Network Security System
    Wen, Kaifeng
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 38 - 41
  • [48] Environment Monitoring System of Household Security Robot Based on Wireless Mesh Network
    Tian, WenJie
    Geng, Yu
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 176 - 180
  • [49] Smart homes under siege: Assessing the robustness of physical security against wireless network attacks
    Allen, Ashley
    Mylonas, Alexios
    Vidalis, Stilianos
    Gritzalis, Dimitris
    COMPUTERS & SECURITY, 2024, 139
  • [50] Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping
    Jie, Yingmo
    Li, Mingchu
    Guo, Cheng
    Chen, Ling
    IEEE ACCESS, 2018, 6 : 51374 - 51383