Method of tracking DDoS attack in wireless sensor network

A wireless sensor and network technology, applied in the field of network security, can solve the problems of unusability and low efficiency, and achieve the effect of reducing false alarm rate, increasing burden and improving anti-interference ability

Inactive Publication Date: 2013-08-14
CHANGZHOU UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional "edge sampling" labeling methods cannot be directly used in wireless sensor networks
[0007] 2) The

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of tracking DDoS attack in wireless sensor network
  • Method of tracking DDoS attack in wireless sensor network
  • Method of tracking DDoS attack in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]The present invention will be further elaborated below in conjunction with specific examples.

[0038] like figure 1 As shown, the steps of the tracking method include marking the data packets with a certain probability, extracting the data packet information through the base station, reconstructing the attack path, confirming the attack and taking measures.

[0039] The tag information (first, top, tail, start, end, distance) of the packet contains six tag fields. The six label domains are divided into two layers. The first layer consists of (first, top, tail), which is mainly used to reconstruct the backbone part of the path. The second layer consists of (start, end, distance), which is used to reconstruct the local path from the common node start to the cluster head node top in the cluster.

[0040] The meanings of these six marked fields: the first field indicates the ID of the first cluster head node that the attack data packet passes through, and the first fiel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method of tracking DDoS (distributed denial of service) attack in the wireless sensor network. According to the method, data packets are marked, and source tracking is performed by utilizing the marked data packets, so as to identify malicious attack nodes. The marking method comprises the following steps: setting marking information (first, top, tail, start, end, distance) of six marking domains in the data packets, then marking cluster head node data packets and common node data packets, and discovering attack paths and proceeding accordingly through path reconstruction. The method has excellent convergence, reduces uncertainty of the attack source, and improves the anti-jamming capability.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an attack source tracking method for a distributed denial of service (DDoS) attack in a wireless sensor network. Background technique [0002] As the product of the combination of computer, communication and sensor technology, wireless sensor network has great application prospects in many fields such as national defense and military, environmental detection, traffic management and so on. Recently, the Internet of Things, which has attracted much attention from the world and has become one of the five major network trends in the future, is one of the key technologies for realizing it, which is the wireless sensor network, which also makes the wireless sensor network an active research branch in the field of computer science. [0003] The wireless sensor network is composed of a large number of micro sensor nodes deployed in the monitoring area, and forms a multi-hop ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/16H04W84/12
Inventor 倪彤光顾晓清李玉
Owner CHANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products