{"title":"AODV协议中基于行为和节点性能的灰洞攻击检测与截断","authors":"Shrishti Jain, S. Raghuwanshi","doi":"10.1109/ICAETR.2014.7012931","DOIUrl":null,"url":null,"abstract":"In Mobile ad-hoc Network nodes dynamically moves from one place to another and if one node wants to communicate with other node then for communication route establishment between two communicating nodes should takes place Due to dynamic nature many routing attacks also takes place such as black hole and gray hole attack. A gray hole attack is a special kind of black hole attack in this attack malicious node takes part in route discovery process and after route gets discovered through them these nodes start dropping packets and some type of packet will be blocked, gray hole attack detection process is difficult rather than black hole attack. This paper presents Ad-hoc on demand Distance Vector Routing Protocol as a base routing strategies and some node set as a IDS (intrusion detection system) to detect gray hole attack. Here we apply behavioural anomaly base detection for gray hole attack and IDS node watch the anomaly of data generated by gray hole node and broadcast the gray hole node block message to all participated nodes for prevention of that type of attack. the entire work simulate using the network simulator-2 and analyze the performance using network base parameter and identify the anomaly generator node as well as data drop identification.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Behavioural and node performance based Grayhole attack Detection and Amputation in AODV protocol\",\"authors\":\"Shrishti Jain, S. Raghuwanshi\",\"doi\":\"10.1109/ICAETR.2014.7012931\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Mobile ad-hoc Network nodes dynamically moves from one place to another and if one node wants to communicate with other node then for communication route establishment between two communicating nodes should takes place Due to dynamic nature many routing attacks also takes place such as black hole and gray hole attack. A gray hole attack is a special kind of black hole attack in this attack malicious node takes part in route discovery process and after route gets discovered through them these nodes start dropping packets and some type of packet will be blocked, gray hole attack detection process is difficult rather than black hole attack. This paper presents Ad-hoc on demand Distance Vector Routing Protocol as a base routing strategies and some node set as a IDS (intrusion detection system) to detect gray hole attack. Here we apply behavioural anomaly base detection for gray hole attack and IDS node watch the anomaly of data generated by gray hole node and broadcast the gray hole node block message to all participated nodes for prevention of that type of attack. the entire work simulate using the network simulator-2 and analyze the performance using network base parameter and identify the anomaly generator node as well as data drop identification.\",\"PeriodicalId\":196504,\"journal\":{\"name\":\"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAETR.2014.7012931\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAETR.2014.7012931","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Behavioural and node performance based Grayhole attack Detection and Amputation in AODV protocol
In Mobile ad-hoc Network nodes dynamically moves from one place to another and if one node wants to communicate with other node then for communication route establishment between two communicating nodes should takes place Due to dynamic nature many routing attacks also takes place such as black hole and gray hole attack. A gray hole attack is a special kind of black hole attack in this attack malicious node takes part in route discovery process and after route gets discovered through them these nodes start dropping packets and some type of packet will be blocked, gray hole attack detection process is difficult rather than black hole attack. This paper presents Ad-hoc on demand Distance Vector Routing Protocol as a base routing strategies and some node set as a IDS (intrusion detection system) to detect gray hole attack. Here we apply behavioural anomaly base detection for gray hole attack and IDS node watch the anomaly of data generated by gray hole node and broadcast the gray hole node block message to all participated nodes for prevention of that type of attack. the entire work simulate using the network simulator-2 and analyze the performance using network base parameter and identify the anomaly generator node as well as data drop identification.