DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Se-hun | - |
dc.contributor.advisor | 김세헌 | - |
dc.contributor.author | Lee, Keun-Soo | - |
dc.contributor.author | 이근수 | - |
dc.date.accessioned | 2011-12-14T02:40:55Z | - |
dc.date.available | 2011-12-14T02:40:55Z | - |
dc.date.issued | 2008 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=295316&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/40625 | - |
dc.description | 학위논문(박사) - 한국과학기술원 : 산업공학과, 2008.2, [ iv, 82 p. ] | - |
dc.description.abstract | Guaranteeing secure and reliable communications in wireless and wired networks is very important in recent and future networks. In this thesis, we propose effective defense schemes to protect wireless adhoc network and wired networks from illegal intrusions. Wireless mobile adhoc networks (MANETs) have many applications to the environments where creating fixed infrastructure is prohibitive. However, as the medium is easily monitored, the topology of the network is dynamic, the networking protocols rely on distributed cooperation of the nodes, and the nodes have constrained capabilities, MANETs are particularly vulnerable to intrusions, especially to sinkhole intrusion. The sinkhole intrusion redirects all routes in the networks to a sinkhole node to do malicious behaviors. In this thesis, we propose an efficient method for sinkhole intrusion detections in MANETs using Dynamic Source Routing (DSR) protocol. The proposed method uses the route record of transmitted route request messages for detection, and removes the identified attack node from the network. Through the computer simulations, we show that the proposed method has better performance than other sinkhole detection methods in terms of detection rate, detection time, and energy consumption. Another issue dealt with in the thesis is a scheme to defend against service denial attacks in large scale networks. Distributed Denial of Service (DDoS) attack causes very serious problems to availability or stability of the Internet. A very large number of compromised agent hosts which are distributed widely on the Internet generate enormous volume of traffic to a target system to prohibit providing services. As they spoof the source IP address of their packets, it is very difficult to trace them. All systems connected to the Internet can be a victim although they are well-equipped in security. In this thesis, an effective defense scheme is proposed. Unlike other methods, source IP spoofing feature is adopte... | eng |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | mobile adhoc network | - |
dc.subject | sinkhole attack | - |
dc.subject | distributed denial of service attack | - |
dc.subject | self-organizing map neural network model | - |
dc.subject | 이동성 에드혹 네트워크 | - |
dc.subject | sinkhole 공격 | - |
dc.subject | 분산서비스 거부 공격 | - |
dc.subject | 자기 조직화 맵 신경망 모델 | - |
dc.subject | mobile adhoc network | - |
dc.subject | sinkhole attack | - |
dc.subject | distributed denial of service attack | - |
dc.subject | self-organizing map neural network model | - |
dc.subject | 이동성 에드혹 네트워크 | - |
dc.subject | sinkhole 공격 | - |
dc.subject | 분산서비스 거부 공격 | - |
dc.subject | 자기 조직화 맵 신경망 모델 | - |
dc.title | Intrusion detection for secure communications in data networks | - |
dc.title.alternative | 데이터 망에서 안전한 통신을 위한 침입탐지 기법에 관한 연구 | - |
dc.type | Thesis(Ph.D) | - |
dc.identifier.CNRN | 295316/325007 | - |
dc.description.department | 한국과학기술원 : 산업공학과, | - |
dc.identifier.uid | 020045178 | - |
dc.contributor.localauthor | Kim, Se-hun | - |
dc.contributor.localauthor | 김세헌 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.