Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T...Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently.展开更多
传统周期模式挖掘忽略了模式本身的相关性和时效性,导致获取到一些实用价值有限的弱相关且时效性较低的模式。因此,提出了新颖的基于时效性和相关性约束的周期模式挖掘方法(correlation and recency periodic frequent pattern-breadth ...传统周期模式挖掘忽略了模式本身的相关性和时效性,导致获取到一些实用价值有限的弱相关且时效性较低的模式。因此,提出了新颖的基于时效性和相关性约束的周期模式挖掘方法(correlation and recency periodic frequent pattern-breadth first search,CRPFP-BFS)和(correlation and recency periodic frequent pattern-depth first search,CRPFP-DFS)。将给定的数据库压缩到一个列式结构的列表CRPFP-List中,CRPFP-BFS和CRPFP-DFS分别采用广度优先和深度优先搜索方式递归地进行挖掘,同时利用支持度、周期、时效性以及相关性剪枝策略减少搜索空间,以有效地发现相关时效周期模式。与当前最先进算法在密集数据集和稀疏数据集上进行对比实验,结果表明CRPFP-BFS和CRPFP-DFS具有较低的内存占用和更高的运行效率,并且具有良好的可扩展性,其中CRPFP-DFS适合于内存要求严格的情况,CRPFP-BFS在长事务稀疏数据集下的运行效率更高。展开更多
基金This project was supported by the National"863"High Technology Development Programof China (2003AA148010) Key Technologies R&D Programof China (2002DA103A03 -07)
文摘Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently.
文摘传统周期模式挖掘忽略了模式本身的相关性和时效性,导致获取到一些实用价值有限的弱相关且时效性较低的模式。因此,提出了新颖的基于时效性和相关性约束的周期模式挖掘方法(correlation and recency periodic frequent pattern-breadth first search,CRPFP-BFS)和(correlation and recency periodic frequent pattern-depth first search,CRPFP-DFS)。将给定的数据库压缩到一个列式结构的列表CRPFP-List中,CRPFP-BFS和CRPFP-DFS分别采用广度优先和深度优先搜索方式递归地进行挖掘,同时利用支持度、周期、时效性以及相关性剪枝策略减少搜索空间,以有效地发现相关时效周期模式。与当前最先进算法在密集数据集和稀疏数据集上进行对比实验,结果表明CRPFP-BFS和CRPFP-DFS具有较低的内存占用和更高的运行效率,并且具有良好的可扩展性,其中CRPFP-DFS适合于内存要求严格的情况,CRPFP-BFS在长事务稀疏数据集下的运行效率更高。