{"title":"水下命名数据网络中的自组织协同拒绝服务","authors":"Yue Li, Yingjian Liu, Haoyu Yin, Hao Teng","doi":"10.1145/3291940.3291954","DOIUrl":null,"url":null,"abstract":"In recent years, Named Data Networking (NDN) begins to be applied to Underwater Sensor Networks (UWSN). Although Underwater Named Data Networking (UNDN) performs well in data transmission, it still faces some security threats from Denial-of-Service (DoS) attacks. This paper proposed Self-Organizing Synergetic Denial-of-Service (SOSDoS) in which high-latency malicious interests sent by attackers will be cooperatively replied by other attackers. Experimental results illustrate that the SOSDoS attack almost trebled the network traffic caused by traditional DoS attack. Furthermore, a defense method based on classification was proposed. Simulation experiments proved that the proposed defense method can effectively detect and resist both SOSDoS attacks and traditional DoS attacks. Finally, we highlight some future works of UNDN.","PeriodicalId":429405,"journal":{"name":"Proceedings of the 13th International Conference on Underwater Networks & Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Self-organizing synergetic denial-of-service in underwater named data networking\",\"authors\":\"Yue Li, Yingjian Liu, Haoyu Yin, Hao Teng\",\"doi\":\"10.1145/3291940.3291954\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, Named Data Networking (NDN) begins to be applied to Underwater Sensor Networks (UWSN). Although Underwater Named Data Networking (UNDN) performs well in data transmission, it still faces some security threats from Denial-of-Service (DoS) attacks. This paper proposed Self-Organizing Synergetic Denial-of-Service (SOSDoS) in which high-latency malicious interests sent by attackers will be cooperatively replied by other attackers. Experimental results illustrate that the SOSDoS attack almost trebled the network traffic caused by traditional DoS attack. Furthermore, a defense method based on classification was proposed. Simulation experiments proved that the proposed defense method can effectively detect and resist both SOSDoS attacks and traditional DoS attacks. Finally, we highlight some future works of UNDN.\",\"PeriodicalId\":429405,\"journal\":{\"name\":\"Proceedings of the 13th International Conference on Underwater Networks & Systems\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 13th International Conference on Underwater Networks & Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3291940.3291954\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 13th International Conference on Underwater Networks & Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3291940.3291954","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Self-organizing synergetic denial-of-service in underwater named data networking
In recent years, Named Data Networking (NDN) begins to be applied to Underwater Sensor Networks (UWSN). Although Underwater Named Data Networking (UNDN) performs well in data transmission, it still faces some security threats from Denial-of-Service (DoS) attacks. This paper proposed Self-Organizing Synergetic Denial-of-Service (SOSDoS) in which high-latency malicious interests sent by attackers will be cooperatively replied by other attackers. Experimental results illustrate that the SOSDoS attack almost trebled the network traffic caused by traditional DoS attack. Furthermore, a defense method based on classification was proposed. Simulation experiments proved that the proposed defense method can effectively detect and resist both SOSDoS attacks and traditional DoS attacks. Finally, we highlight some future works of UNDN.