Font Size: a A A

Signature-based Intrusion Detection In Mobile Ad Hoc Networks

Posted on:2018-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:G Q LiFull Text:PDF
GTID:2348330518498660Subject:Information security
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc network is a new type of networks without fixed structure,central control node or base station,all the nodes in it are equal to each other with the ability of routing and forwarding packages,just like a router.The Mobile Ad Hoc network has a wide range of applications because the nodes can be moved and organized arbitrarily with high flexible and scalable deployment.To reach the convenience,the network sacrifice some safety measures,so there are serious security issues in all the seven layer of this network,especially the attacks to the routing in the network layer,such as black hole attack,gray hole attack and wormhole attack,which cause some serious damages to the normal communication.These attacks are different from each other with its own unique attack characteristics,it provides a theoretical basis for the detection and classification of these attacks.In this thesis,the detection methods of these attacks in Mobile Ad Hoc network are studied.In this thesis,the characteristics and defects of Ad Hoc network are fully investigated,two important routing protocols AODV and DSR protocol and the reasons why they are vulnerable to be attacked are analyzed in detail.Then,combining the existing solutions to the black hole attack,wormhole attack and the gray hole attack,the characteristics of these attacks and their influences on the route discovery and the data packet are analyzed and simulated.At the same time,the normal characteristics of normal nodes in Ad Hoc network are learned by the statistical methods,which provides the basis of the subsequent decisions of the detections.On the basis of the above work,an attack detection scheme of Mobile Ad Hoc networks is proposed,which can simultaneously detect black hole attack,wormhole attack and the gray hole attack with low requirement of network resources and low cost of implementation and maintenance.Finally,the simulation is carried out on the NS3 platform,the simulation results show that the proposed scheme is feasible and effective.
Keywords/Search Tags:Ad Hoc network, attack characteristic, black hole, wormhole, NS3
PDF Full Text Request
Related items