
Тема выпуÑкной квалификационной работы: «Обнаружение Ñетевых атак на протокол RPL». Ð”Ð°Ð½Ð½Ð°Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ð° поÑвÑщена иÑÑледованию безопаÑноÑти протокола маршрутизации RPL, анализу ÑущеÑтвующих ÑредÑтв защиты и разработке метода уÑÑ‚Ñ€Ð°Ð½ÐµÐ½Ð¸Ñ Ð°Ñ‚Ð°Ðº Ñ Ð¸Ñтощением реÑурÑов. Предметом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑŽÑ‚ÑÑ Ð¼ÐµÑ‚Ð¾Ð´Ñ‹ обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑти работы протокола RPL. Задачи, которые решалиÑÑŒ в ходе иÑÑледованиÑ: 1. Ðнализ принципов работы протокола RPL и его механизмов безопаÑноÑти. 2. Ðнализ методов Ð¿Ñ€Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð°Ñ‚Ð°Ðº на протокол RPL. 3. ИÑÑледование методов и ÑредÑтв защиты от атак на протокол RPL. 4. Разработка методов по обнаружению атак Ñ Ð¸Ñтощением реÑурÑов на протокол RPL. 5. Ð ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð¸ проведение теÑÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ð¾ÑпоÑобноÑти разработанных методов. Ð’ результате Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ñ‹ были иÑпользованы возможноÑти Ñетевого ÑимулÑтора Cooja и операционной ÑиÑтемы Contiki OS Ð´Ð»Ñ Ð¿Ð¾ÑÑ‚Ñ€Ð¾ÐµÐ½Ð¸Ñ Ð¿Ñ€Ð¾Ñ‚Ð¾Ñ‚Ð¸Ð¿Ð° раÑпределенной ÑиÑтемы Ð¾Ð±Ð½Ð°Ñ€ÑƒÐ¶ÐµÐ½Ð¸Ñ Ð°Ñ‚Ð°Ðº Ñ Ð¸Ñтощением реÑурÑов тип на протокол RPL. Ð Ð°Ð·Ñ€Ð°Ð±Ð¾Ñ‚Ð°Ð½Ð½Ð°Ñ ÑиÑтема показала Ñвою работоÑпоÑобноÑть и возможноÑть противоÑтоÑть атакам на протокол RPL.
Topic of the final qualification work: «Detection of attacks on the RPL protocol». This work is devoted to the study of the security of the RPL routing protocol, the analysis of existing protection tools and the development of a method for eliminating resource exhaustion attacks. The subject of the study is the methods for ensuring the security of the RPL protocol. Tasks that were solved in the course of the study: 1. Analysis of the principles of the RPL protocol and its security mechanisms. 2. Analysis of methods for carrying out attacks on the RPL protocol. 3. Study of methods and means of protection against attacks on the RPL protocol. 4. Development of a methods for detecting resource depletion attacks on the RPL protocol. 5. Implementation and performance testing of the developed methods. As a result of the work, the capabilities of the Cooja network simulator and the Contiki OS operating system were used to build a prototype of a distributed system for detecting attacks with resource depletion type on the RPL protocol. The developed system has shown its operability and ability to withstand attacks on the RPL protocol.
ÑиÑÑема обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ñак, network attack detection, RPL protocol, interquartile range, пÑоÑокол RPL, межкваÑÑилÑнÑй ÑазмаÑ, ÐÑÑиÑлиÑелÑнÑе ÑеÑи, attack detection system, обнаÑÑжение ÑеÑевÑÑ Ð°Ñак
ÑиÑÑема обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ñак, network attack detection, RPL protocol, interquartile range, пÑоÑокол RPL, межкваÑÑилÑнÑй ÑазмаÑ, ÐÑÑиÑлиÑелÑнÑе ÑеÑи, attack detection system, обнаÑÑжение ÑеÑевÑÑ Ð°Ñак
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
