A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy

Author(s):  
Jaekwang Kim ◽  
Jee-Hyong Lee
2021 ◽  
Author(s):  
Sicheng Gong

This paper proposes a novel event-triggered attack detection mechanism for converter-based DC microgrid system. Under a distributive network framework, each node collects its neighbours' relative data to regulate its own output for local stabilization. Without power line current data, hardly can an agent directly identify the source of unexpected power flow, especially under an organized attack composed of voltage variations and corresponding deceptive messages. In order to recognize traitors who broadcast wrong data, target at system distortion and even splitting, an efficient attack detection and identification strategy is mandatory. After the attack detector is triggered, each relative agent refuses to trust any received data directly before authentication. Through proposed two-step verification by comparing theoretical estimated signals with received ones, both self sensors and neighbour nodes would be inspected, and the attacker was difficult to hide himself. Through simulation on SIMULINK/PLECS and hardware experiments on dSpace Platform, the effectiveness of proposed detection algorithm has been proved.


Information ◽  
2020 ◽  
Vol 11 (4) ◽  
pp. 198
Author(s):  
Junhyeok Yun ◽  
Mihui Kim

Mobile crowdsensing is a data collection system using widespread mobile devices with various sensors. The data processor cannot manage all mobile devices participating in mobile crowdsensing. A malicious user can conduct a Sybil attack (e.g., achieve a significant influence through extortion or the generation of fake IDs) to receive an incentive or destroy a system. A mobile crowdsensing system should, thus, be able to detect and block a Sybil attack. Existing Sybil attack detection mechanisms for wireless sensor networks cannot apply directly to mobile crowdsensing owing to the privacy issues of the participants and detection overhead. In this paper, we propose an effective privacy-preserving Sybil attack detection mechanism that distributes observer role to the users. To demonstrate the performance of our mechanism, we implement a Wi-Fi-connection-based Sybil attack detection model and show its feasibility by evaluating the detection performance.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 1102
Author(s):  
Kareemulla Shaik ◽  
Md. Ali Hussain

Broadcast Communication is crucial in VANET communication, to send and receive safety messages within network. Securing these beacon message is a challenge, since they are very prone to clone and Sybil attacks. Many works have been proposed to address this problem but they failed to address how to detect and protect these messages from clone attacks and also limited to static networks with limited data sizes.  To achieve this a secure authentication and attack detection mechanism can be designed. In this paper we propose a secure broadcast message authentication and attack detection mechanism with Identity – Based Signatures. Experimental results proved that it can be used in both V2V and V2RSU c communications.   Our scheme shown best performance compared to existing schemes in terms of packet delivery ration, detection rate and detection time.  


Author(s):  
Mahsa Hosseinpour ◽  
Seyed Amin Hosseini Seno ◽  
Mohammad Hossein Yaghmaee Moghaddam ◽  
Hossein Khosravi Roshkhari

Sensors ◽  
2020 ◽  
Vol 20 (5) ◽  
pp. 1300
Author(s):  
Sumit Pundir ◽  
Mohammad Wazid ◽  
Devesh Pratap Singh ◽  
Ashok Kumar Das ◽  
Joel J. P. C. J. P. C. Rodrigues ◽  
...  

The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes ( S H A s) have some properties (for example, they first attract the other normal nodes for the shortest path to the destination and when normal nodes initiate the process of sending their packets through that path (i.e., via S H A ), the attacker nodes start disrupting the traffic flow of the network). In the presence of S H A s, the destination (for example, sink node i.e., gateway/base station) does not receive the required information or it may receive partial or modified information. This results in reduction of the network performance and degradation in efficiency and reliability of the communication. In the presence of such an attack, the throughput decreases, end-to-end delay increases and packet delivery ratio decreases. Moreover, it may harm other network performance parameters. Hence, it becomes extremely essential to provide an effective and competent scheme to mitigate this attack in EIoT. In this paper, an intrusion detection scheme to protect EIoT environment against sinkhole attack is proposed, which is named as SAD-EIoT. In SAD-EIoT, the resource rich edge nodes (edge servers) perform the detection of different types of sinkhole attacker nodes with the help of exchanging messages. The practical demonstration of SAD-EIoT is also provided using the well known NS2 simulator to compute the various performance parameters. Additionally, the security analysis of SAD-EIoT is conducted to prove its resiliency against various types of S H A s. SAD-EIoT achieves around 95.83 % detection rate and 1.03 % false positive rate, which are considerably better than other related existing schemes. Apart from those, SAD-EIoT is proficient with respect to computation and communication costs. Eventually, SAD-EIoT will be a suitable match for those applications which can be used in critical and sensitive operations (for example, surveillance, security and monitoring systems).


Sign in / Sign up

Export Citation Format

Share Document