入侵检测技术在移动Ad Hoc网络中的应用
被引量:2
Application of Intrusion Detection System in Mobile Ad Hoc Networks
摘要
文章介绍了入侵检测技术及其分类,指出了在移动AdHoc(自组织)网络中应用入侵检测系统(IDS)所面临的挑战,提出了一种基于域的多层移动AdHoc网络入侵检测系统,并阐述了它的网络结构和工作原理。
出处
《电子技术(上海)》
2004年第8期4-7,共4页
Electronic Technology
参考文献13
-
1Yongguang Zhang,Wenke Lee.Intrusion Detection in Wireless Ad Hoc Networks.In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking(MobiCom'2000),August 6-11,2000,Boston, Massachussetts
-
2Staniford-Chen S,Cheung S,Crawford R,et al..GrIDS: a Graph Based Intrusion Detection System for Large Networks. In: National Institute of Standards and Technology. Proceedings of the 19th National Information Security Conference, Oct 1996,(1): 361-370
-
3Macker J.Corson S.Mobile Ad Hoc Networks (MANET).Ht tp://www.ietf.org/html. charter/manet-charter.html,1997
-
4Wood M,Erlinger M. Intrusion Detection Message Exchange Requirements. Internet-Draft,draft-ietf-idwg- requirements-06,2001
-
5Jiejun Kong, Haiyun Luo, Kaixin Xu,et al. Adaptive Security for Multi-layer Ad Hoc Networks.http:// www.cs.ucla.edu/wing/pdfdocs/WCMC02.pdf
-
6B.Lu,U. W. Pooch. Cooperative Security-Enforcement in Mobile Ad Hoc Networks. MWCN 2002 Conference Program,Session 8: Mobile and Wireless Security
-
7Jean-Pierre Hubaux,Levente Buttyan,Srdan Capkun.The Quest for Security in Mobile Ad Hoc Networks. Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing. MobiHOC,2001
-
8Lunt T F,Jagannathan R,Lee R,et al..IDES: The Enhanced Prototype--a Real-Time Intrusion Detection Expert System. Technical Report SRI-CSl-88-12, CASRI International,1988
-
9Teresa F Lunt,Debra Anderson. Software Requirements Specification: Next Generation Intrusion Detection Expert System. Final Report A001,CA: SRI International,1994
-
10Porras P A,Valdes A.Live Traffic Analysis of TCP/IP Gateways. In:Proc of ISOC Symp on Network and Distributed System Security(NDSS'98),San Diego,CA,March 1998
同被引文献39
-
1张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..
-
2MILLER D, VANDERKNYFF C. Conserving power and securing ad hoc wireless networks by enhancing the 802.11 wireless protocol[EB/OL].http://www.cs.unc.edu/-dorianm/academics/comp290mc/latex_2co1.pdr.
-
3FASBENDER A, KESDOGAN D, KUBITZ O. Variable and scalable security protection of location information in mobile IP[A].IEEE VTS,46th Vehicular Technology Conference[C]. Atlanta, USA, 1996.741-750.
-
4MUKHERJEE B, HEBERLFJN T L, LEVITT K N. Network intrusion detection[J]. IEEE Network, 1994, 8(3): 26-41.
-
5LUNT T F, ANDERSON D. Software Requirements Specification:Next Generation Intrusion Detection Expert System[R]. Final Report a001, CA: SRI International, 1994.
-
6MACKER J, CORSON S. Mobile ad hoc networks (MANET)[EB/OL]. http://www.ietf.org/html.charter/manet-charter.html, 1997.
-
7MENG C K, LEE K W, et al. Security Concerns in Ad Hoc Networks[R]. CS4274 Term Paper: Wireless Security, 2001.
-
8BUTFYAN H J P, L CAPKUN S C. The quest for security in mobile ad hoc networks[A]. Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing Mobiboc[C]. Long Beach,CA, USA 2001.846-861.
-
9ZHOU L I, ZYGMUNT J H. Securing ad hoc networks[J], IEEE Networks, 1999, 13(6): 24-30.
-
10KARPUOKI V. Security in ad hoc netwodcs[A]. Tik-110.501 Seminar on Security[C]. Helsinki University of Teclmology, 2000. 102-115.
二级引证文献10
-
1何菲,赵泽茂,徐瑞.无线自组织网络路由协议的漏洞攻击及对策[J].杭州电子科技大学学报(自然科学版),2009,29(6):19-22.
-
2徐瑞,赵泽茂,何菲.基于攻击集的移动自组网MAC层DDoS攻击[J].计算机应用研究,2011,28(3):1148-1151.
-
3王旭赢,林中华,胡源.Ad Hoc网络黑洞攻击仿真研究[J].海军工程大学学报,2011,23(2):103-107. 被引量:5
-
4周星,刘军,董春冻,张玉静.对辅助定位按需路由协议的安全性改进[J].计算机应用,2013,33(6):1619-1621. 被引量:1
-
5陈善学,冯银波.基于四元数模型和奇异值分解的图像水印算法[J].计算机应用,2013,33(6):1626-1629. 被引量:3
-
6谭盛彪,刘俊.OPNET在水声通信网中的应用研究[J].数字通信,2013,40(3):37-41. 被引量:2
-
7华驰,王忠恒,王辉.移动Ad Hoc网络中增强下一跳节点选择的路由机制[J].成都大学学报(自然科学版),2013,32(3):280-284.
-
8李晋南,林金朝,庞宇,李承晓,黄华伟.人体局域网的MAC层分析与研究[J].数字通信,2014,41(1):19-23. 被引量:1
-
9张冰涛,王小鹏,王履程,张忠林,李延林,刘虎.基于图论的MANET入侵检测方法[J].电子与信息学报,2018,40(6):1446-1452. 被引量:8
-
10冯景瑜,杜续,王宏刚,黄文华.认知ad hoc网络中的多信道路由安全威胁及其对策研究[J].通信学报,2016,37(S1):92-97. 被引量:1
-
1任淑艳.无线传感器网络路由算法的改进[J].信息与电脑(理论版),2010(4):168-168.
-
2曾夏玲,章琳.多层移动传感网络sink节点覆盖优化控制研究[J].信息与电脑(理论版),2014,0(3):101-102.
-
3施荣华,袁倩.一种安全的多层移动自组网密钥管理方案[J].中南大学学报(自然科学版),2010,41(1):201-206. 被引量:6
-
4曾夏玲,黎虹,李广振.多层移动传感网络的移动策略模型研究[J].科技广场,2010(8):6-8.
-
5龚春红,金敏.多层移动CRM应用架构设计与分析[J].邵阳学院学报(自然科学版),2007,4(3):35-38. 被引量:1
-
6朱征林,史杏荣,袁平波.一种新的多层移动ad hoc网络中的密钥管理方案[J].计算机工程与应用,2005,41(26):141-144. 被引量:1
-
7张行文,孙宝林.移动Ad Hoc网络的入侵检测技术体系结构[J].江汉大学学报(自然科学版),2006,34(3):90-92.
-
8彭雅丽,刘嘉遥,范玮,尹红.多层三角网格轨迹模型的移动传输控制策略[J].计算机工程,2014,40(2):16-20.
-
9刘林峰,刘业.多层移动IPv6的动态管理方案[J].东南大学学报(自然科学版),2005,35(6):838-842.