فهرست:
چکیده............................................................................................................................................ 1
فصل اول: کلیات تحقیق
1-1 مقدمه 3
1-2 بیان مسأله 5
1-3 اهمیت و ضرورت تحقیق........................................................................................................ 7
1-4 اهداف تحقیق......................................................................................................................... 7
1-5 فرضیهها 7
فصل دوم: مروری بر ادبیات تحقیق و پیشینهی تحقیق
2-1 سیستم های تشخیص نفوذ 9
2-1-1 تاریخچه سیستم های تشخیص نفوذ 9
2-1-2 معماری سیستم های تشخیص نفوذ 12
2-1-3 روش های دریافت اطلاعات............................................................................................... 13
2-1-4 روش های آنالیز. 14
2-1-5 زمانبندی............................................................................................................................ 15
2-1-6 روش های پاسخ. 15
2-1-7 کنترل سیستم. 16
2-1-8 منابع اطلاعات.. 17
2-1-8-1 منابع اطلاعات سیستم مبتنی بر شبکه............................................................................... 19
2-1-9 آنالیز و تکنیک های تشخیص نفوذ 20
2-1-10 تکنیک های پاسخ. 21
2-2 شبکههای سیار 23
2-2-1 شبکههای دارای زیرساخت.................................................................................................. 25
2-2-2 شبکههای بدون زیر ساخت................................................................................................. 26
2-3 شبکه موردی سیار 27
2-3-1 تاریخچه شبکههای موردی سیار 28
2-3-2 خصوصیات و ویژگیهای شبکههای موردی سیار.................................................................... 29
2-3-2 مسیریابی در شبکه های موردی سیار 33
2-3-2-1 پروتکلهای مسیریابی. 34
2-3-3 کاربردهای شبکه های موردی سیار 40
2-3-4 امنیت در شبکه های موردی سیار 42
2-3-4-1 ویژگیهای یک سیستم امن.......................................................................... 42
2-3-4-2 چرخهی امنیت.. 43
2-3-4-3 مشکلات امنیتی موجود در شبکههای موردی سیار 44
2-3-4-4 انواع حملات در شبکههای موردی سیار 45
2-4 پیشینه تحقیق. 54
فصل سوم: روش اجرای تحقیق
مقدمه............................................................................................................................................. 60
3-1 فاز اول.................................................................................................................................. 61
3-2 فاز دوم 63
3-3 فاز سوم 66
فصل چهارم: تجزیه و تحلیل دادهها
4-1 نرم افزار NS . 68
4-2 ویژگیهای شبکهی شبیه سازی شده.......................................................................................... 69
4-3 پارامترهای مورد ارزیابی. 70
4-4 نتایج...................................................................................................................................... 71
4-5 تجزیه و تحلیل دادهها............................................................................................................. 75
4-5-1 میانگین نرخ اتلاف بسته ها 75
4-5-2 توان عملیاتی شبکه............................................................................................................. 76
4-5-3 مجموع تأخیر کل شبکه 77
4-5-4 بار مسیریابی نرمال........................................................................................ 78
فصل پنجم: نتیجه گیری و پیشنهادات
5-1 نتیجه گیری. 81
5-2 پیشنهادات.............................................................................................................................. 86
منابع و مآخد.................................................................................................................................. 87
پیوست ها 91
چکیده انگلیسی..................................................................................................... 104
منبع:
منابع فارسی
[1] حفیظ پور، حدیث. (1391). ارائه الگوریتم جدید جهت کشف حمله سیاهچاله در مسیریابی AODV. پایان نامه کارشناسی ارشد مهندسی کامپیوتر گرایش نرم افزار. دانشکده فنی مهندسی. دانشگاه آزاد اسلامی. واحد علوم و تحقیقات.
[2] کارگر، ح.ر. دستگردی، م. ب. و اکبری، م. 1389. راهنمای جامع نرم افزار شبیه ساز ns-2. تهران: ناقوس
منابع انگلیسی
[3] Alem Y.F, Xuan Z.C. (2010). ‘‘Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection”. in: proc. IEEE Of the International Conference on Communication. 978-1-4244-5824-0.
[4] Anita, E.A.M., Vasudevan, V. (2010). ‘‘Blackhole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining”. Intl. Journal of Computer Applications.
[5] Basagni, S., Conti, M., Giordano, S. (2004). ‘‘Mobile Ad Hoc Networking”. IEEE Press. ch10. ISBN: 0471373133.
[6] Clausen, T., Jacquet, P. (2003). ‘‘Optimized Link State Routing Protocol (OLSR) ”. IETF RFC3626.
[7] Djahel, S., Nait-Abdesselam, F., Khokhar, A. (2008). ‘‘ An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol”. Proc. of the IEEE International Conference on Communications (ICC), pp. 2780–2785.
[8] Guardo, E., Morabito, G., Catania, G., Mursia, A., Battiati, F. (2014). “BRAVO: A Black-hole Resilient Ad-hoc on demand distance Vector rOuting for tactical communications”. IEEE International Black Sea Conference on Communication and Networking.
[9] Gurley Bace, R. (2000). ‘‘Intrusion Detection”، Macmillan Technical Publishing.
[10] Hu, Y.C., Perrig, A. (2004). ‘‘A Survey of Secure Wireless Ad Hoc Routing”. IEEE Security and Privacy. 2(3),28-39.
[11] Hu, Y.C., Perrig, A., Johnson, D.B. (2005). Ariadne: ‘‘A secure On-Demand Routing Protocol for AdHoc Networks”. In Wireless Networks Journal. 11(1,2), 21-38
[12] Jain, S., Jain, M., Kandwal, H. (2010) ‘‘Advanced Algorithm for Detection and Prevention of Cooperative Black and Grayhole Attacks in Mobile Ad Hoc Networks”. Intl. Journal of Computer Applications 1(7):37–42.
[13] Kaur, J., Singh, B. (2014). “Detect and Isolate Black hole Attack in MANET using AODV Protocol”. International Journal of Advanced in Computer Engineering & Technology (IJARCET).
[14] Kim, H., Eugene, H., Spafford, G. (1995). “The Design and Implementation of Tripwire: A File System IntegrityChecker”. Purdue University.
[15] Kurosawa, S., Nakayama, H., Kato, N., Jamalipour,A., Nemoto, Y. (2007) .‘‘ Detecting blackhole attack on AODV-based Mobile Ad Hoc Networks by dynamic learning method”. International Journal of Network Security 5 (3) 338–346.
[16] Larsson, T., Hedman, N. (1998). ‘‘Routing Protocols in Wireless Ad-hoc NetworksA Simulation Study”. Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm.
[17] Lundberg, J. (2000). ‘‘Routing Security in Ad Hoc Networks. Seminar onNetwork Security”. pp. 1-12.
[18] Luo, J., Fan, M., Ye, D. (2008). ‘‘ Black Hole Attack Prevention Based on Authentication Mechanism”. Proc. of the IEEE Singapore International Conference on Communication Systems (ICCS), pp. 173–177.
[19] Lu, S., Li, L., Lam, K-Y., Jia, L. (2009). ‘‘SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack”. Proc. of Intl. Conference on Computational Intelligence and Security (CIS '09), Dec. 11-14, Beijing, China, pp. 421-425.
[20] Momen, A.M.A., Hamza, H.S., Saroit, I.A. (2010). ‘‘A Survey on security enhanced multicast routing protocols in Mobile Adhoc Networks”. IEEE Conference. pp-262-268
[21] Mohanapriya, M., Krishnamurthi, I. (2013). “Modified DSR protocol for detection and removal of selective black hole attack in MANET”. Elsevier Ltd. doi:10.1016-j.
[22] Murthy, S.R., Manoj, B.S. (2007). ‘‘ Ad hoc Wireless Networks:Architectures and Protocols ”. Pearson Education. ISBN: 9788131759059.
[23] Papadimitratos, P., Zygmunt, J. (2002). ‘‘Secure Routing for Mobile Ad Hoc Networks”. Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS).
[24] Perkins, C.E., Beliding-Royer, Das, S.E. (2004). ‘‘Ad hoc on-demand distance vector (AODV) routing”. IETF Internet Draft. MANET working group.
[25] Perkins, C.E., Das, S.R., Royer, E.M. (2000). ‘‘Ad-Hoc on Demand Distance Vector (AODV) ”. http://www.ietf.org/internet-drafts/draft-ietf -manet-aodv-05.txt.
[26] Perkins, C.E., Belding-Royer, E.M., Das, S.R. (2003). ‘‘Mobile Ad Hoc Networking Working Group. http://www.cs.ucsb.edu/Internet Draft/draft-ietf -manet-bcast-02.txt
[27] Perkins, E.C., Bhagwat, P. (1994). ‘‘Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers”. SIGCOMM .
[28] Person, M. (2000).“Mobile Agent Architectures”، Defense Research Establishmen.
[29] Qabajeh, L.K., Kiah, L.M., Qabajeh, M.M. (2009). “ A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks”. IJCSN International Journal of Computer Science and Network Security.
[30] Raja Mahmood, R.A., Khan, A.I. (2007). ‘‘A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks”. in: Proc. of the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET), pp. 1–6.
[31] Roesch, M. (1999). “Snort – Light Weight Intrusion Detection for Networks”. USENIX Association.
[32] Shurman, M.A., Yoo, S.M., Park, S. (2004). ‘‘Black hole attack in wireless ad hoc networks”. ACM 42 ndSoutheast Conference (ACMSE’04), pp. 96-97.
[33] Stanger, J., Lane, T. P., Danielyan, E. (2001). “ Hack Proofing Linux”, Syngress.
[34] Savner, J., Gupta, V. (2014) “Clustering of Mobile Ad hoc Networks: An Approach for Black Hole Prevention”, IEEE ,ICICT. DOI: 10.1109 ICICICT.2014.6781308.
[35] su, M.Y. (2010). “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems” . Elsever .
[36] Soleimani, M.T., Kahvand, M. (2014). “Defending Packet Dropping Attacks Based on Dynamic Trust Model in Wireless Ad Hoc Networks”. IEEE Mediterrean Electrotechnical Conference. Beirut,Lebanon.
[37] Tamilselvan, L., Sankaranarayanan, V. (200). “Prevention of blackhole attack in MANE”, Journal of networks, vol. 3, No. 5, pp 13-20.
[38] Varshney, T., Sharma, T., Sharma, P. (2014). ‘‘Impelmentation of Watchdog Protocol With AODV in Mobile Ad Hoc Network”. IEEE Fourth International Conference on Communication Systems and Network Technologies, DOI 10.1109/CSNT.2014.50.
[39] Wang, C., Feng, T., Kim, J., Wang, G. (2009). ‘‘Catching Packet Droppers and Modifiers in Wireless Sensor NetworkS”. IEEE Conferences. pp-1-9.
[40] Weerasinghe, H.., Fu, H. (2007). “Preventing cooperative blackhole attacks in mobile ad hoc networks: Simulation implementation and evaluation”, Proc. of Intl.Conference on Future Generation Communication and Networking (FGCN’07), Jeju Island, Korea, pp. 362-367, 20
[41] Zapata, G.M., Asokan, N. (2002). ‘‘Securing Ad-hoc Routing Protocols”. Proc Of the ACM Workshop on Wireless Security (WiSe).