A Black Hole Attack Model for Reactive Ad-Hoc Protocols

Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack o...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Badenhop, Christopher W
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Badenhop, Christopher W
description Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR. The original document contains color images.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA557337</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA557337</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA5573373</originalsourceid><addsrcrecordid>eNrjZDB3VHDKSUzOVvDIz0lVcCwpAbF981NScxTS8osUglITk0syy4AyKboe-ckKAUX5JfnJ-TnFPAysaYk5xam8UJqbQcbNNcTZQzelJDM5vrgkMy-1JN7RxdHU1NzY2NyYgDQASNMpcA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</title><source>DTIC Technical Reports</source><creator>Badenhop, Christopher W</creator><creatorcontrib>Badenhop, Christopher W ; AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</creatorcontrib><description>Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR. The original document contains color images.</description><language>eng</language><subject>AD HOC NETWORKS ; ATTACK MODELS ; BLACK HOLE ATTACKS ; Command, Control and Communications Systems ; Computer Systems ; Computer Systems Management and Standards ; CYBER SECURITY ; DATA TRANSMISSION SECURITY ; HOP DISTANCE DENSITY FUNCTION ; NETWORK AVAILABILITY ; NETWORK CENTRIC WARFARE ; NETWORK TOPOLOGY ; THESES</subject><creationdate>2012</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27567,27568</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA557337$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Badenhop, Christopher W</creatorcontrib><creatorcontrib>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</creatorcontrib><title>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</title><description>Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR. The original document contains color images.</description><subject>AD HOC NETWORKS</subject><subject>ATTACK MODELS</subject><subject>BLACK HOLE ATTACKS</subject><subject>Command, Control and Communications Systems</subject><subject>Computer Systems</subject><subject>Computer Systems Management and Standards</subject><subject>CYBER SECURITY</subject><subject>DATA TRANSMISSION SECURITY</subject><subject>HOP DISTANCE DENSITY FUNCTION</subject><subject>NETWORK AVAILABILITY</subject><subject>NETWORK CENTRIC WARFARE</subject><subject>NETWORK TOPOLOGY</subject><subject>THESES</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2012</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZDB3VHDKSUzOVvDIz0lVcCwpAbF981NScxTS8osUglITk0syy4AyKboe-ckKAUX5JfnJ-TnFPAysaYk5xam8UJqbQcbNNcTZQzelJDM5vrgkMy-1JN7RxdHU1NzY2NyYgDQASNMpcA</recordid><startdate>201203</startdate><enddate>201203</enddate><creator>Badenhop, Christopher W</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>201203</creationdate><title>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</title><author>Badenhop, Christopher W</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA5573373</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2012</creationdate><topic>AD HOC NETWORKS</topic><topic>ATTACK MODELS</topic><topic>BLACK HOLE ATTACKS</topic><topic>Command, Control and Communications Systems</topic><topic>Computer Systems</topic><topic>Computer Systems Management and Standards</topic><topic>CYBER SECURITY</topic><topic>DATA TRANSMISSION SECURITY</topic><topic>HOP DISTANCE DENSITY FUNCTION</topic><topic>NETWORK AVAILABILITY</topic><topic>NETWORK CENTRIC WARFARE</topic><topic>NETWORK TOPOLOGY</topic><topic>THESES</topic><toplevel>online_resources</toplevel><creatorcontrib>Badenhop, Christopher W</creatorcontrib><creatorcontrib>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Badenhop, Christopher W</au><aucorp>AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>A Black Hole Attack Model for Reactive Ad-Hoc Protocols</btitle><date>2012-03</date><risdate>2012</risdate><abstract>Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR. The original document contains color images.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_ADA557337
source DTIC Technical Reports
subjects AD HOC NETWORKS
ATTACK MODELS
BLACK HOLE ATTACKS
Command, Control and Communications Systems
Computer Systems
Computer Systems Management and Standards
CYBER SECURITY
DATA TRANSMISSION SECURITY
HOP DISTANCE DENSITY FUNCTION
NETWORK AVAILABILITY
NETWORK CENTRIC WARFARE
NETWORK TOPOLOGY
THESES
title A Black Hole Attack Model for Reactive Ad-Hoc Protocols
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T02%3A15%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=A%20Black%20Hole%20Attack%20Model%20for%20Reactive%20Ad-Hoc%20Protocols&rft.au=Badenhop,%20Christopher%20W&rft.aucorp=AIR%20FORCE%20INST%20OF%20TECH%20WRIGHT-PATTERSON%20AFB%20OH%20GRADUATE%20SCHOOL%20OF%20ENGINEERING%20AND%20MANAGEMENT&rft.date=2012-03&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA557337%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true