Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30 results about "Packet drop attack" patented technology

In computer networking, a packet drop attack or blackhole attack is a type of denial-of-service attack in which a router that is supposed to relay packets instead discards them. This usually occurs from a router becoming compromised from a number of different causes. One cause mentioned in research is through a denial-of-service attack on the router using a known DDoS tool. Because packets are routinely dropped from a lossy network, the packet drop attack is very hard to detect and prevent.

Wireless QoS by hardware packet sizing, data rate modulation, and transmit power controlling based on the accumulated packet drop rate

Two methods to improve the QoS. These methods can be applied individually or together. The first method is a packet sizing method, which is based on the Bit Error rate as well as the packet drop rate. The second method is a data transmit rate modulation method. The proposed methods in this invention, unlike the packet size reduction method that is in the WiMedia specification, enables the MAC to reduce and increase the packet size and the data transmit rate by working with the upper layer controller to maximize the data transfer rate, the transmitter power, and to minimize the packet drop rate.
Owner:LEE HYUN

Routing method of wireless ad hoc network

The invention relates to a routing method of a wireless ad hoc network and belongs to the technical field of networks. According to the routing method, the existing AODV (Ad hoc On-Demand Distance Vector Routing) protocol is improved, and the routing method comprises the following steps of: firstly, sending an explorer packet rather than data after a source node for sending data receives rout response grouping of other intermediate nodes of a non-destination node, requiring the response of a destination node, if the response of the destination node is received, considering that no routing black hole exists on the route, and then sending data; and if the sending node does not receive the response of the destination node, giving up the route and reselecting other routes. In the invention, only by simply modifying the AODV protocol, the purpose of preventing the attack of the conventional route black hole in the wireless ad hoc network can be realized, and the safety of the wireless ad hoc network can be improved.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

Black hole attack detection and tracking method based on doubtful degree accumulation

ActiveCN109756515ARealize TrackingContaining Black Hole AttacksTransmissionNetwork packetNetwork control
The invention belongs to the field of mobile ad hoc network routing security, and discloses a black hole attack detection and tracking method based on doubtful accumulation. According to the method, in a detection period, a passive monitoring mode is adopted, a node detects whether current topology update meets a suspicious condition, and if a data packet of the topology update meets the suspicious condition, the node adds a IV-type suspicious degree to a reputation registration table corresponding to the suspicious node; The node monitors the packet loss rate in each routing path, and triggers active detection if the packet loss rate exceeds the threshold value; an active detection mode is aodpted to detect suspicious behaviors so as to determine a correspondingly increased doubtful value, and performing weighted calculation on credit changes at different moments according to a forgetting factor so as to obtain a final doubtful value; And according to the final doubtful value of the suspicious node, the network control station determines whether the suspicious node is a malicious node through analysis, and once the suspicious node is confirmed to be the malicious node, the networkcontrol station broadcasts the whole network so as to isolate the malicious node from the whole network.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

SAODV optimization method capable of effectively fighting against black hole attacks

The invention discloses a SAODA optimization method capable of effectively fighting against black hole attacks. The technical schemes are as follows: based on the Hash function and the digital signature of a SAODA protocol, adding the concept of fidelity to the middle nodes to serve as the determination basis for their trustworthiness; during the route establishing and data transmitting stage, conducting dynamic calculation and constant updating to the fidelity of the nodes; and when the fidelity reaches a too small point, determining that the node is a black hole node and abandoning it. The method of the invention solves the problem that black hole attacks could not be solved in the existing SAODV protocol. With the method, the black hole node could be identified, therefore, making the network more reliable and more secure. The method is suitable for the Ad-Hoc network.
Owner:陕西尚品信息科技有限公司

Black hole attack defense method applied to route discovery

The invention discloses a black hole attack defense method applied to route discovery. The objective of the invention is to solve the problem of incapability of detecting inner attacks and defending against black hole attacks in route discovery in the prior art. According to the method provided by the technical schemes of the invention, each node establishes a receiving route request table and a receiving route response table and compares the content of the receiving route request table and the receiving route response table; whether a suspicious node exists is judged; if a suspicious node exists, a determined threshold value in a training set is compared with the destination sequence number of a received route response packet; if the sequence number is larger than the threshold value, it is determined that a node which sends the route response packet is a black hole node, otherwise, the node which sends the route response packet is determined as a normal node; and in subsequent route discovery, only the data packet of the normal node is forwarded or received, and the data packet of the black hole node is not forwarded or received. According to the black hole attack defense method applied to route discovery of the invention, a third party is not introduced, all procedures are completely completed by nodes in a wireless ad hoc network, and therefore, the security requirements of the routing of the wireless ad hoc network can be satisfied. The method can be applied to defending against black hole attacks in the route discovery of the wireless ad hoc network.
Owner:XIDIAN UNIV

OLSR protocol black hole attack method for unmanned aerial vehicle ad hoc network

The invention discloses an OLSR (Optimized Link State Routing) protocol black hole attack method for an unmanned aerial vehicle ad hoc network. The problem that an existing black hole attack method cannot be applied to a high-mobility drone ad hoc network is solved, the formation and the motion trail of the drone are changed, and finally the purpose of obtaining the network control right is achieved. The method comprises the following implementation steps that: an execution node calculates a node in a network center in an area through a routing table; the execution node reaches the transmission range of the central node through the time delay information transmitted by the data packet; the execution node sends a large number of Hello message packets of which the IP addresses are randomly modified to the central node to occupy the position of the central node; and node tampering is executed or the data packet in the network is discarded, and black hole attack is performed on the network. According to the method, the motion trail of the unmanned aerial vehicle ad hoc network can be drastically changed, the attack effect is good, the network is greatly damaged, and the method has obvious advantages in the aspects of changing the formation and the motion trail of the unmanned aerial vehicle, obtaining the control right of the network and the like.
Owner:SOUTHEAST UNIV

CC (Challenge Collapsar) attack defense method of distributed system and distributed system

InactiveCN111565195AFix slow responseSolvers the problem of downtimeTransmissionDomain nameCache server
The invention relates to a CC (Challenge Collapsar) attack defense method of a distributed system and the distributed system. The method comprises the steps that a cache server receives a domain nameresolution request message sent by a client in the distributed system; the cache server queries a domain name resolution result of a preset domain name requested to be resolved by the domain name resolution request message; and under the condition that the domain name resolution result of the preset domain name is queried, the cache server sends the domain name resolution result of the preset domain name to the client. Through the method and the device, the problem of slow response or downtime of the DNS server due to CC attack is solved, and CC attack to the DNS server is avoided.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

A detection method for Internet of Things packet drop attack and Internet of Things tree system

ActiveCN103327032BCommunication overhead impactTransmissionThe InternetInterconnection
The invention provides a detection method for a malicious packet dropping attack of the Internet of things. The detection method comprises the following steps of: calculating a natural packet receiving interval variance and calculating an actual packet receiving interval variance; and judging whether the actual packet receiving interval variance is larger than a first threshold obtained according to the natural packet receiving interval variance, if the actual packet receiving interval variance is larger than the first threshold, determining that an Internet of things tree system falls into the malicious packet dropping attack. In a conclusion, according to the Internet of things tree system, the natural packet receiving interval variance obtained when the Internet of things tree system does not fall into the attack and the actual packet receiving interval variance obtained when an information packet is actually received are respectively calculated; and when the actual packet receiving interval variance is larger than the first threshold obtained according to the natural packet receiving interval variance, the Internet of things tree system falls into the malicious packet dropping attack. Therefore, according to the technical scheme of the invention, a routing node and a terminal node do not need to return acknowledgement information, so that communication expense in the Internet of things tree system cannot be extra affected. The invention also provides the Internet of things tree system.
Owner:INST OF MICROELECTRONICS CHINESE ACAD OF SCI

Satellite ad hoc network security framework system and black hole attack resisting method thereof

The invention discloses a satellite ad hoc network security framework system based on a block chain technology. The system comprises a data layer, a network layer, a consensus layer, a function implementation layer and an application layer, the data layer stipulates the structure and the content of each block; the satellite nodes of the network layer jointly form a decentralized system structure, and each satellite node is added into the alliance chain system as the identity of an alliance chain member; the consensus layer completes accounting through a right-based consensus mechanism; all satellite nodes in the function implementation layer jointly maintain a block chain account book, routing actions of the satellite nodes in a data plane, announcement of malicious behaviors of the nodes and credible records of current reputation values of all the satellite nodes are achieved according to regulations in an intelligent contract, and the records are stored among all the nodes in a distributed mode; the top layer is an application layer, and the application layer provides network state sensing, black hole attack recognition and reputation reference for satellite nodes of a data plane based on credible records of a bottom layer network, so that network security is guaranteed.
Owner:AEROSPACE DONGFANGHONG SATELLITE

Black hole attack detection and tracking method based on suspicion accumulation

ActiveCN109756515BRealize TrackingContaining Black Hole AttacksTransmissionPathPingData pack
The invention belongs to the field of mobile ad hoc network routing security, and discloses a black hole attack detection and tracking method based on doubtful accumulation. According to the method, in a detection period, a passive monitoring mode is adopted, a node detects whether current topology update meets a suspicious condition, and if a data packet of the topology update meets the suspicious condition, the node adds a IV-type suspicious degree to a reputation registration table corresponding to the suspicious node; The node monitors the packet loss rate in each routing path, and triggers active detection if the packet loss rate exceeds the threshold value; an active detection mode is aodpted to detect suspicious behaviors so as to determine a correspondingly increased doubtful value, and performing weighted calculation on credit changes at different moments according to a forgetting factor so as to obtain a final doubtful value; And according to the final doubtful value of the suspicious node, the network control station determines whether the suspicious node is a malicious node through analysis, and once the suspicious node is confirmed to be the malicious node, the networkcontrol station broadcasts the whole network so as to isolate the malicious node from the whole network.
Owner:CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products