Powered by OpenAIRE graph
Found an issue? Give us feedback
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Обнаружение ÑÐµÑ‚ÐµÐ²Ñ‹Ñ Ð°Ñ‚Ð°Ðº на протокол RPL

выпускная квалификационная работа специалиста

Обнаружение ÑÐµÑ‚ÐµÐ²Ñ‹Ñ Ð°Ñ‚Ð°Ðº на протокол RPL

Abstract

Тема выпускной квалификационной работы: «Обнаружение сетевых атак на протокол RPL». Данная работа посвящена исследованию безопасности протокола маршрутизации RPL, анализу существующих средств защиты и разработке метода устранения атак с истощением ресурсов. Предметом исследования являются методы обеспечения безопасности работы протокола RPL. Задачи, которые решались в ходе исследования: 1. Анализ принципов работы протокола RPL и его механизмов безопасности. 2. Анализ методов проведения атак на протокол RPL. 3. Исследование методов и средств защиты от атак на протокол RPL. 4. Разработка методов по обнаружению атак с истощением ресурсов на протокол RPL. 5. Реализация и проведение тестирования работоспособности разработанных методов. В результате выполнения работы были использованы возможности сетевого симулятора Cooja и операционной системы Contiki OS для построения прототипа распределенной системы обнаружения атак с истощением ресурсов тип на протокол RPL. Разработанная система показала свою работоспособность и возможность противостоять атакам на протокол RPL.

Topic of the final qualification work: «Detection of attacks on the RPL protocol». This work is devoted to the study of the security of the RPL routing protocol, the analysis of existing protection tools and the development of a method for eliminating resource exhaustion attacks. The subject of the study is the methods for ensuring the security of the RPL protocol. Tasks that were solved in the course of the study: 1. Analysis of the principles of the RPL protocol and its security mechanisms. 2. Analysis of methods for carrying out attacks on the RPL protocol. 3. Study of methods and means of protection against attacks on the RPL protocol. 4. Development of a methods for detecting resource depletion attacks on the RPL protocol. 5. Implementation and performance testing of the developed methods. As a result of the work, the capabilities of the Cooja network simulator and the Contiki OS operating system were used to build a prototype of a distributed system for detecting attacks with resource depletion type on the RPL protocol. The developed system has shown its operability and ability to withstand attacks on the RPL protocol.

Keywords

система обнаружения атак, network attack detection, RPL protocol, interquartile range, протокол RPL, межквартильный размаÑ, Вычислительные сети, attack detection system, обнаружение ÑÐµÑ‚ÐµÐ²Ñ‹Ñ Ð°Ñ‚Ð°Ðº

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!