期刊文献+

入侵检测技术在移动Ad Hoc网络中的应用 被引量:2

Application of Intrusion Detection System in Mobile Ad Hoc Networks
原文传递
导出
摘要 文章介绍了入侵检测技术及其分类,指出了在移动AdHoc(自组织)网络中应用入侵检测系统(IDS)所面临的挑战,提出了一种基于域的多层移动AdHoc网络入侵检测系统,并阐述了它的网络结构和工作原理。
作者 王梅 李娜
出处 《电子技术(上海)》 2004年第8期4-7,共4页 Electronic Technology
  • 相关文献

参考文献13

  • 1Yongguang Zhang,Wenke Lee.Intrusion Detection in Wireless Ad Hoc Networks.In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking(MobiCom'2000),August 6-11,2000,Boston, Massachussetts
  • 2Staniford-Chen S,Cheung S,Crawford R,et al..GrIDS: a Graph Based Intrusion Detection System for Large Networks. In: National Institute of Standards and Technology. Proceedings of the 19th National Information Security Conference, Oct 1996,(1): 361-370
  • 3Macker J.Corson S.Mobile Ad Hoc Networks (MANET).Ht tp://www.ietf.org/html. charter/manet-charter.html,1997
  • 4Wood M,Erlinger M. Intrusion Detection Message Exchange Requirements. Internet-Draft,draft-ietf-idwg- requirements-06,2001
  • 5Jiejun Kong, Haiyun Luo, Kaixin Xu,et al. Adaptive Security for Multi-layer Ad Hoc Networks.http:// www.cs.ucla.edu/wing/pdfdocs/WCMC02.pdf
  • 6B.Lu,U. W. Pooch. Cooperative Security-Enforcement in Mobile Ad Hoc Networks. MWCN 2002 Conference Program,Session 8: Mobile and Wireless Security
  • 7Jean-Pierre Hubaux,Levente Buttyan,Srdan Capkun.The Quest for Security in Mobile Ad Hoc Networks. Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing. MobiHOC,2001
  • 8Lunt T F,Jagannathan R,Lee R,et al..IDES: The Enhanced Prototype--a Real-Time Intrusion Detection Expert System. Technical Report SRI-CSl-88-12, CASRI International,1988
  • 9Teresa F Lunt,Debra Anderson. Software Requirements Specification: Next Generation Intrusion Detection Expert System. Final Report A001,CA: SRI International,1994
  • 10Porras P A,Valdes A.Live Traffic Analysis of TCP/IP Gateways. In:Proc of ISOC Symp on Network and Distributed System Security(NDSS'98),San Diego,CA,March 1998

同被引文献39

  • 1张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..
  • 2MILLER D, VANDERKNYFF C. Conserving power and securing ad hoc wireless networks by enhancing the 802.11 wireless protocol[EB/OL].http://www.cs.unc.edu/-dorianm/academics/comp290mc/latex_2co1.pdr.
  • 3FASBENDER A, KESDOGAN D, KUBITZ O. Variable and scalable security protection of location information in mobile IP[A].IEEE VTS,46th Vehicular Technology Conference[C]. Atlanta, USA, 1996.741-750.
  • 4MUKHERJEE B, HEBERLFJN T L, LEVITT K N. Network intrusion detection[J]. IEEE Network, 1994, 8(3): 26-41.
  • 5LUNT T F, ANDERSON D. Software Requirements Specification:Next Generation Intrusion Detection Expert System[R]. Final Report a001, CA: SRI International, 1994.
  • 6MACKER J, CORSON S. Mobile ad hoc networks (MANET)[EB/OL]. http://www.ietf.org/html.charter/manet-charter.html, 1997.
  • 7MENG C K, LEE K W, et al. Security Concerns in Ad Hoc Networks[R]. CS4274 Term Paper: Wireless Security, 2001.
  • 8BUTFYAN H J P, L CAPKUN S C. The quest for security in mobile ad hoc networks[A]. Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing Mobiboc[C]. Long Beach,CA, USA 2001.846-861.
  • 9ZHOU L I, ZYGMUNT J H. Securing ad hoc networks[J], IEEE Networks, 1999, 13(6): 24-30.
  • 10KARPUOKI V. Security in ad hoc netwodcs[A]. Tik-110.501 Seminar on Security[C]. Helsinki University of Teclmology, 2000. 102-115.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部