scholarly journals Profile based Novel Approach for Jamming Attack Detection and Prevention in MANET

2017 ◽  
Vol 167 (4) ◽  
pp. 31-36
Author(s):  
Aparna Raj ◽  
Pankaj Kumar
2021 ◽  
Vol 11 (12) ◽  
pp. 5685
Author(s):  
Hosam Aljihani ◽  
Fathy Eassa ◽  
Khalid Almarhabi ◽  
Abdullah Algarni ◽  
Abdulaziz Attaallah

With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, developing and improving attack detection techniques are prominent methods to defend against cyberattacks. One of the promising attack detection methods is behaviour-based attack detection methods. Practically, attack detection techniques are widely applied in distributed software systems that utilise network environments. However, there are some other challenges facing attack detection techniques, such as the immutability and reliability of the detection systems. These challenges can be overcome with promising technologies such as blockchain. Blockchain offers a concrete solution for ensuring data integrity against unauthorised modification. Hence, it improves the immutability for detection systems’ data and thus the reliability for the target systems. In this paper, we propose a design for standalone behaviour-based attack detection techniques that utilise blockchain’s functionalities to overcome the above-mentioned challenges. Additionally, we provide a validation experiment to prove our proposal in term of achieving its objectives. We argue that our proposal introduces a novel approach to develop and improve behaviour-based attack detection techniques to become more reliable for distributed software systems.


2021 ◽  
pp. 100464
Author(s):  
Jagdeep Singh ◽  
Isaac Woungang ◽  
Sanjay Kumar Dhurandher ◽  
Khuram Khalid

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Yupeng Gong ◽  
Adrian Wonfor ◽  
Jeffrey H. Hunt ◽  
Ian H. White ◽  
Richard V. Penty

AbstractSecurity issues and attack management of optical communication have come increasingly important. Quantum techniques are explored to secure or protect classical communication. In this paper, we present a method for in-service optical physical layer security monitoring that has vacuum-noise level sensitivity without classical security loopholes. This quantum-based method of eavesdropping detection, similar to that used in conventional pilot tone systems, is achieved by sending quantum signals, here comprised of continuous variable quantum states, i.e. weak coherent states modulated at the quantum level. An experimental demonstration of attack detection using the technique was presented for an ideal fibre tapping attack that taps 1% of the ongoing light in a 10 dB channel, and also an ideal correlated jamming attack in the same channel that maintains the light power with excess noise increased by 0.5 shot noise unit. The quantum monitoring system monitors suspicious changes in the quantum signal with the help of advanced data processing algorithms. In addition, unlike the CV-QKD system which is very sensitive to channel excess noise and receiver system noise, the quantum monitoring is potentially more compatible with current optical infrastructure, as it lowers the system requirements and potentially allows much higher classical data rate communication with links length up to 100 s km.


2015 ◽  
Vol 1083 ◽  
pp. 148-154
Author(s):  
Wei Zhou ◽  
Fei Xie ◽  
Yi Fan Zhu ◽  
Qun Li ◽  
Wang Xun Zhang

The feature of deception jamming for GNSS-dot networks is researched and analyzed, and it is difficult to accurately locate and correct the interference position by using the interference detection methods of the traditional WSN, a new attack detection algorithm that based on an improved angle of arrival (AOA) positioning mechanism to determine the point of disruption and interference correction is proposed. Nextly the algorithm of a single interference source localization based on the hyperbolic method by using anti-jamming principle of the GNSS is researched and given, and can locate both single and multiple interference sources. Then the indicators and methods of performance evaluation for the GNSS-dot networks are proposed. Finally, Experiment based on the algorithm is realized, and the attack detection and correction is very efficient, and interference location under ideal conditions is higher efficiency, and the strategies of anti deception jamming are also identified.


Micromachines ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 1019
Author(s):  
Yen-Hung Chen ◽  
Yuan-Cheng Lai ◽  
Kai-Zhong Zhou

The Deterministic Network (DetNet) is becoming a major feature for 5G and 6G networks to cope with the issue that conventional IT infrastructure cannot efficiently handle latency-sensitive data. The DetNet applies flow virtualization to satisfy time-critical flow requirements, but inevitably, DetNet flows and conventional flows interact/interfere with each other when sharing the same physical resources. This subsequently raises the hybrid DDoS security issue that high malicious traffic not only attacks the DetNet centralized controller itself but also attacks the links that DetNet flows pass through. Previous research focused on either the DDoS type of the centralized controller side or the link side. As DDoS attack techniques are evolving, Hybrid DDoS attacks can attack multiple targets (controllers or links) simultaneously, which are difficultly detected by previous DDoS detection methodologies. This study, therefore, proposes a Flow Differentiation Detector (FDD), a novel approach to detect Hybrid DDoS attacks. The FDD first applies a fuzzy-based mechanism, Target Link Selection, to determine the most valuable links for the DDoS link/server attacker and then statistically evaluates the traffic pattern flowing through these links. Furthermore, the contribution of this study is to deploy the FDD in the SDN controller OpenDayLight to implement a Hybrid DDoS attack detection system. The experimental results show that the FDD has superior detection accuracy (above 90%) than traditional methods under the situation of different ratios of Hybrid DDoS attacks and different types and scales of topology.


Sign in / Sign up

Export Citation Format

Share Document