Ala Mughaid, Ibrahim Obaidat, A. Aljammal, Shadi Alzu'bi, Fatima M. Quiam, Dena Abu Laila, Aseel Al-zou’bi, L. Abualigah
{"title":"模拟分析了自组织路由协议在DDoS攻击下的性能,并提出了解决方案","authors":"Ala Mughaid, Ibrahim Obaidat, A. Aljammal, Shadi Alzu'bi, Fatima M. Quiam, Dena Abu Laila, Aseel Al-zou’bi, L. Abualigah","doi":"10.5267/j.ijdns.2023.2.002","DOIUrl":null,"url":null,"abstract":"Ad hoc networks, known as infrastructure-less networks, are composed of mobile nodes that connect without a centralized system controlling them. These networks have a wide range of potential applications, including emergency response, events, military operations, wireless access, and intelligent transportation. They can take on various forms, such as wireless sensor networks, wireless mesh networks, and mobile ad hoc networks. Because users in these networks can move around at any time, routing protocols must adapt to the constantly changing network layout. However, these networks are also susceptible to various security threats, including DDoS attacks. This paper aims to analyze the performance and impact of security attacks on the performance of reactive and proactive routing protocols in CBR connection patterns with different pause times. The analysis is provided in metrics such as throughput, packet loss, end-to-end delay, and load. The simulation results show that, on average, the OPNET Modeler simulator analyzed the performance results under DDoS attacks under voice and video traffic conditions. Furthermore, the paper explores the use of Honeypot intelligent agents as a solution to increase security by creating a dummy node to fool DDoS attackers. The results show that the OLSR protocol is most affected by DDoS attacks in terms of quality-of-service metrics such as packet loss, throughput, end-to-end delay, and load. The number of responses to the honeypot solutions differs for each protocol.","PeriodicalId":36543,"journal":{"name":"International Journal of Data and Network Science","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution\",\"authors\":\"Ala Mughaid, Ibrahim Obaidat, A. Aljammal, Shadi Alzu'bi, Fatima M. Quiam, Dena Abu Laila, Aseel Al-zou’bi, L. Abualigah\",\"doi\":\"10.5267/j.ijdns.2023.2.002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad hoc networks, known as infrastructure-less networks, are composed of mobile nodes that connect without a centralized system controlling them. These networks have a wide range of potential applications, including emergency response, events, military operations, wireless access, and intelligent transportation. They can take on various forms, such as wireless sensor networks, wireless mesh networks, and mobile ad hoc networks. Because users in these networks can move around at any time, routing protocols must adapt to the constantly changing network layout. However, these networks are also susceptible to various security threats, including DDoS attacks. This paper aims to analyze the performance and impact of security attacks on the performance of reactive and proactive routing protocols in CBR connection patterns with different pause times. The analysis is provided in metrics such as throughput, packet loss, end-to-end delay, and load. The simulation results show that, on average, the OPNET Modeler simulator analyzed the performance results under DDoS attacks under voice and video traffic conditions. Furthermore, the paper explores the use of Honeypot intelligent agents as a solution to increase security by creating a dummy node to fool DDoS attackers. The results show that the OLSR protocol is most affected by DDoS attacks in terms of quality-of-service metrics such as packet loss, throughput, end-to-end delay, and load. The number of responses to the honeypot solutions differs for each protocol.\",\"PeriodicalId\":36543,\"journal\":{\"name\":\"International Journal of Data and Network Science\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Data and Network Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5267/j.ijdns.2023.2.002\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Data and Network Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5267/j.ijdns.2023.2.002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution
Ad hoc networks, known as infrastructure-less networks, are composed of mobile nodes that connect without a centralized system controlling them. These networks have a wide range of potential applications, including emergency response, events, military operations, wireless access, and intelligent transportation. They can take on various forms, such as wireless sensor networks, wireless mesh networks, and mobile ad hoc networks. Because users in these networks can move around at any time, routing protocols must adapt to the constantly changing network layout. However, these networks are also susceptible to various security threats, including DDoS attacks. This paper aims to analyze the performance and impact of security attacks on the performance of reactive and proactive routing protocols in CBR connection patterns with different pause times. The analysis is provided in metrics such as throughput, packet loss, end-to-end delay, and load. The simulation results show that, on average, the OPNET Modeler simulator analyzed the performance results under DDoS attacks under voice and video traffic conditions. Furthermore, the paper explores the use of Honeypot intelligent agents as a solution to increase security by creating a dummy node to fool DDoS attackers. The results show that the OLSR protocol is most affected by DDoS attacks in terms of quality-of-service metrics such as packet loss, throughput, end-to-end delay, and load. The number of responses to the honeypot solutions differs for each protocol.