Font Size: a A A

Research On Countermeasures Of "Shadow Network"

Posted on:2013-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:J PanFull Text:PDF
GTID:2298330467976362Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In order to realize its political purpose and strategic interests, the United States created "Shadow network". The network could break through the specific supervision of country, it can cause great damage. Therefore, the study has important safety meaning.Put forward the counter-measure system model, mainly divides into four modules: reconnaissance module, identification module, positioning module, attack module. Reconnaissance module is the foundation of achieving the attack purpose, this module mainly realize to the signals of shadow network, recognition module mainly complete two parts:one is achieve position of the nodes, the other is analytical agreement of the wireless signal, positioning modules of the system find the topology of shadow network based on the caught nodes and the agreement of the wireless signal, and find out the key nodes’ position, attack module is to destroy the normal operation of the shadow network or make it useful to us. Proposed an improved algorithm based on mobile agents, effectively avoid the oscillation and eliminates congestion through set a clock in each node. From the social network analysis Angle, brought forward a node important indexes evaluating method. The attack ways are expounded in the attack module.Use the NS2simulation software to simulation analysis attack based on the agreement, the results show that:attacking the key nodes in network is useful than attacking the common nodes.
Keywords/Search Tags:Shadow network, Countermeasure, Topology discovery, Node importance, Protocol attacks
PDF Full Text Request
Related items