Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
Yanzhi RenMooi Choo ChuahJie YangYingying ChenPublished in: WOWMOM (2010)
Keyphrases
- internet traffic
- traffic analysis
- stepping stones
- network model
- switched networks
- watermarking scheme
- packet loss
- countermeasures
- internet protocol
- detect malicious
- packet switching
- differentiated services
- network intrusion detection systems
- normal traffic
- destination node
- packet forwarding
- supply chain
- network structure