Welcome![Sign In][Sign Up]
Location:
Search - AODV attack

Search list

[OS programIDS_of_blackhole_attacksaodv

Description: Intrusion detection for black hole attack on AODV protocol.
Platform: | Size: 10240 | Author: ubaid | Hits:

[Windows Developblackholeaodv

Description: 在ns2下仿真AODV路由协议黑洞攻击时使用的脚本程序-the script of simulation AODV routing blackhole attack under the ns2
Platform: | Size: 57344 | Author: fei | Hits:

[Linux-Unixattack-0.0

Description: File for Misuse AODV 2
Platform: | Size: 2048 | Author: rutusoft | Hits:

[Linux-Unixattack-0.5

Description: File for Misuse AODV 3
Platform: | Size: 2048 | Author: rutusoft | Hits:

[Linux-Unixattack-1.0

Description: File for Misuse AODV 4
Platform: | Size: 2048 | Author: rutusoft | Hits:

[Internet-Networkattack-1.5

Description: File for Misuse AODV 5
Platform: | Size: 2048 | Author: rutusoft | Hits:

[Internet-Networkattack

Description: this file explains attacks on AODV
Platform: | Size: 2048 | Author: VIP | Hits:

[Internet-Networkblackholeaodv

Description: blackhole aodv includes source code and tcl script for aodv and an IDS for fixing the attack
Platform: | Size: 45056 | Author: shams | Hits:

[Internet-NetworkADHOCnetworkblackhole

Description: ADHOC网络黑洞攻击仿真,黑洞攻击是一种典型的针对无线自组织(Ad Hoc)网络的攻击,也是Ad Hoc网络面临的主要安全威胁之一。为实现对黑洞攻击的仿真研究,基于黑洞攻击原理,在AODV路由协议的基础上,利用OPNET网络仿真平台,建立了Ad Hoc网络黑洞攻击仿真模型,搭建了不同攻击强度下的仿真场景。仿真结果表明:该模型能够较为准确地模拟各种环境下黑洞攻击对Ad Hoc网络性能的影响,可为Ad Hoc网络安全防范等问题的研究提供重要参考。 www.1-fun.com 推荐-Simulation results show that: the model can accurately simulate black hole attack on the Ad Hoc network performance in various environments, the study provides an important reference for the Ad Hoc network security problems.
Platform: | Size: 363520 | Author: 无名 | Hits:

[Internet-NetworkBlackhole-attack

Description: 黑洞攻击的实现,基于AODV协议的,觉得有用可以下载-Realization of the black hole attack based on AODV protocol, find it useful can download and see
Platform: | Size: 25600 | Author: 江先亮 | Hits:

[Internet-NetworkSinkhole-in-AODV

Description: Sinkhole attack in AODV
Platform: | Size: 8192 | Author: Prashi | Hits:

[LabViewblackholeaodv.tar

Description: attack in aodv for ns2
Platform: | Size: 51200 | Author: dinesh | Hits:

[Linux-Unixblackhole20-1-vbr

Description: IDS system which generates first aodv scenario and then it can implement the black hole attack after that it is also detecting the attacker node and preventing the packets routing through them
Platform: | Size: 1024 | Author: krishan kant | Hits:

[Internet-Networkblackholeaodv.tcl.tar

Description: simulating blackhole attack in aodv using ns-2
Platform: | Size: 2048 | Author: dsp | Hits:

[Internet-Networkaodvattacker

Description: AODV attacker ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently improves the overall performance of (normal) AODV in presence of black hole attack.
Platform: | Size: 4096 | Author: madhuri | Hits:

[Internet-Networkaodv_attack

Description: 一个基于aodv协议的黑洞攻击的代码,不是很全,可以做个参考-A black hole attack based on AODV protocol code, is not very wide, can be a reference
Platform: | Size: 25600 | Author: 俞潇为 | Hits:

[Crack Hackblackholeaodv2005-examples.tar

Description: black hole attack mitigation in AODV
Platform: | Size: 7168 | Author: arraji | Hits:

[Internet-NetworkLCM-MAC.tar

Description: implementation of wormhole attack in aodv
Platform: | Size: 92160 | Author: mary | Hits:

[Internet-Networkblackholeaodv

Description: this is aodv protocol under black_hole attack
Platform: | Size: 45056 | Author: farisfaisall | Hits:

[Scannerblackhole

Description: Attack on AODV - Blackhole
Platform: | Size: 17408 | Author: nrasty | Hits:
« 12 »

CodeBus www.codebus.net