期刊文献+

移动自组网络路由行为检测技术的研究

Research of Routing Behavior Detection Technology in Mobile Ad Hoc Network
下载PDF
导出
摘要 移动自组网是一种具有自治、多跳等特性的特殊无线移动通信网络,广泛应用在战场、救灾等特殊场合,而它的特性又使之容易遭受各种攻击。该文提出了移动自组网面临的安全问题,阐述了引入入侵检测技术的必要性。在综述了入侵检测技术及其在移动自组网已开展的研究工作后,该文针对路由行为检测问题提出了基于特征值检测与基于异常行为检测相结合的检测技术RBDT。基于AODV协议,该文具体分析了RBDT技术的实现细节。该技术的应用将有效提高路由行为检测的效率和准确性。 Mobile Ad Hoc Network(MANET) is a multi-hop and autonomy wireless network.It is used in environment which needs a temporary network such as military exercises and disaster relief and has inherent vulnerabilities that make it highly susceptible to malicious attacks.This paper proposes the security problem in MANET and the need for intrusion detection in MANET.After review of IDS in MANET,this paper proposes a routing behavior detection technology-RBDT,which combines anormaly and signature_based detection technology.Based on AODV,this paper then analyzes the realization of RBDT in detail.The application of RBDT will improve the effectiveness and veracity of routing behavior detection efficiently.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第4期137-140,共4页 Computer Engineering and Applications
基金 国家自然科学基金网络与信息安全重大研究计划(编号:90304010)资助
关键词 移动自组网 网络安全 入侵检测 路由行为检测技术 MANET,network security,intrusion detection,Routing Behavior Detection Technology(RBDT)
  • 相关文献

参考文献13

  • 1Elizabeth,M Royer.A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks[J].IEEE Personal Communication, 1999;4(2):46.
  • 2R Heady,G Luger,A Maccabe et al.The architecture of a network level intrusion detection system[R].Technical report,Computer Science Deportment,University of New Mexico, 1990-08.
  • 3Yongguang Zhang, Wenke Lee, Yi-An Huang.Intrusion Detection Techniques for Mobile Wireless Networks[J].ACM/Kluwer Wireless Networks Journal, 2003 ; 9 (5) : 545-556.
  • 4Farooq Anjum, Dhanant Subhadrabandhu, Saswati Sarkar. Signature based Intrusion Detection for Wireless Ad-Hoc Networks:A Comparative study of various muting protocols[C].In:Proceedings of Vehicular Technology Conference, Wireless Security Symposium ,Orlando,Florida, 2003-10.
  • 5Chin-Yang Tseng,Poomima Balasubramanyam,Calvin Ko et al.A Specificatlon-based Intrusion Detection System for AODV.seclab.cs. ucdavis.edu/papem/new_aodvids-v1 .pdf.
  • 6Sergio Marti,T J Giuli,Kevin Lai et al.Mitigating Routing Misbehavior in Mobile Ad Hoe Networks[C].In:Proeeedings of MOBICOM 2000, 2000: 255 -265.
  • 7Baruch Awerbuch,David Hohner,Cfistina Nita-Rotaru et al An On-Demand Secure Routing Protocol Resilent to Byzantine Failures[C]. In:ACM Workshop on Wireless Security(WiSe),Atlanta,Georgia, 2002-09.
  • 8Wensheng Zhang,R Rao,Guohong Cao et al.Secure Routing in Ad Hoe Networks and a Related Intrusion Deteetion Problem[C].In:MIL-COM 2003,2003-10.
  • 9Sonja Buchegger,Jean-Y yes Le Boudee.Pedormance Analysis of the CONFIDANT Protocol :Cooperation of Nodes-Fairness In Dynamic Adhoc Networks[C].In :Proceeding of IEEE/ACM Symposium on Mobile Ad Hoe Networking and Computing( MobiHOC ), Lausanne, CH ,2002-06.
  • 10Sonja Buchegger,Jean-Y ves Le Boudec.Nodes Beating Grudges: Towards Routing Security, Fairness ,and Robustness in Mobile Ad Hoe Networks[C].In:Proceedings of the Tenth Euromicro Workshop on Parallel,Distributed and Network-based Processing,Canary Islands, Spain ,2002-01:403--410.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部