下載/瀏覽Download

Download Report

Transcript 下載/瀏覽Download

報告日期:12月8號
報告學生:馬敏修
2009/12/82009/12/8
2009/12/8
1
Outline

Introduction


A comparative study of various routing
protocol
Performance analysis
Static case
 Dynamic case


Conclusion
2009/12/82009/12/8
2009/12/8
2
Introduction(I)
 Wireless multi-hop networks have come to be
used in various facets of our life.
 Recovery operations in cases of disasters
such as hurricanes, floods, terrorist acts as
witnessed by the WTC bombing etc.
2009/12/82009/12/8
2009/12/8
3
Introduction(II)
 There are two main techniques used for
intrusion detection namely anomaly
detection and misuse detection or
signature detection.
2009/12/82009/12/8
2009/12/8
4
Introduction(III)
 In order to realize these ID techniques the
packets can be sniffed on each of the end hosts.
(HID)
 Also possible to sniff these packets on certain
predetermined machines in the network.(NID)
2009/12/82009/12/8
2009/12/8
5
Introduction(Ⅳ)
 HID systems are designed to monitor, detect
and respond to user and system activity and
attacks on a given host.
 NID deals with information passing on the
entire network between any pair of
communicating hosts.
2009/12/82009/12/8
2009/12/8
6
A comparative study of various
routing protocol(I)
 DSDV routing protocol
(Destination-Sequenced Distance-Vector routing)
 TORA routing protocol
(Temporally-Ordered Routing Algorithm)
2009/12/82009/12/8
7
A comparative study of various
routing protocol(II)
 DSR routing protocol
(Dynamic Source Routing)
 AODV routing protocol
(Ad hoc On Demand Distance Vector )
2009/12/82009/12/8
8
Performance analysis(I)
 There are two types of routing protocols
designed for ad-hoc networks, proactive
routing protocols and reactive routing
protocols.
2009/12/82009/12/8
2009/12/8
9
Performance analysis(II)
 The proactive routing protocols attempt to
maintain routing information from a given
node to every other node in the network.
 Amongst the protocols that we consider
DSDV is a proactive routing protocol.
2009/12/82009/12/8
2009/12/8
10
Performance analysis(III)
 The reactive routing protocols take a lazy
approach to routing.
 Once a route has been established, it is
maintained by a route maintenance procedure
until either the destination becomes
inaccessible or until the route is no longer
desired.
2009/12/82009/12/8
2009/12/8
11
Static case(I)
2009/12/82009/12/8
2009/12/8
12
Static case(II)
2009/12/82009/12/8
2009/12/8
13
Static case(III)
2009/12/82009/12/8
2009/12/8
14
Static case(Ⅳ)
2009/12/82009/12/8
2009/12/8
15
Dynamic case(I)
2009/12/82009/12/8
2009/12/8
16
Dynamic case(II)
2009/12/82009/12/8
2009/12/8
17
Dynamic case(III)
2009/12/82009/12/8
2009/12/8
18
Conclusion
 We focus on signature based intrusion detection
technique and investigate the ability of different adhoc network routing protocols to facilitate detection of
intrusions.
 We show that reactive routing protocols are less
effective than proactive routing protocols in the
absence of mobility.
 We also investigate the relationship between the
probability of intrusion and the number of nodes
2009/12/82009/12/8
2009/12/8
19