期刊文献+

无线移动Ad Hoc网络中的入侵检测技术 被引量:2

Techniques of IDS in Mobile Ad Hoc Networks
下载PDF
导出
摘要 由于网络特性和传播介质的不同,传统有线网络的入侵检测系统(IDS)并不能很好的应用于无线移动A d Hoc网络。无线移动A d Hoc网络中IDS技术面临着诸多挑战。文章通过分析无线移动A d Hoc网络的安全特点,在已有的分布式无线的IDS模型基础上,提出了一种基于异常检测方法的混合型入侵检测系统。 Due to the different network characteristics and transmission media, intrusion detection techniques used in wired networks are not well applied in mobile ad hoc networks (MANET). Wireless intrusion detect;,on is a totally new research field, which has to face many challenges. The aim of this article is to explore and analyze the security issues of MANET, and to propose a hybrid wireless intrusion detection system based on an existing distributed WIDS model.
作者 郭小兵
机构地区 武汉理工大学
出处 《交通与计算机》 2005年第5期76-79,共4页 Computer and Communications
关键词 移动AD Hoc网络(MANET) 入侵检测系统(IDS) mobile Ad Hoe netwoks(MANET) intrusion detection system(IDS)
  • 相关文献

参考文献9

  • 1Axelsson S.Intrusion detection systems:a taxomomy and survey.Tech.report no.99-15,Dept.of Comp.Eng.,Chalmers Univ.of Technology,Sweden,March,2003.20.
  • 2Mukherjee B.Heberlein L T,Levitt K N.Network intrusion detection.IEEE Network,May.,1994.28~42.
  • 3Paul Brutch,Calvin Ko.Challenges in intrusion detec-tion for wireless mobile Ad Hoc networks.Proceedings of the workshop on Security and Assurance in Ad Hoc Networks,Orlando,Ajn,2003.
  • 4Amitabh Mishra,Ketan Nadkarni,Animesh Patcha.Intrusion Detection in wireless Ad Hoc networks.IEEE Wireless Communications,Feb.,2004.48~60.
  • 5Zhang Y,Lee W.Intrusion detection in wireless Ad Hoc networks.6th Int'l.Conf.Mobile Comp.and Net.,Aug.,2000.275~283.
  • 6Zhang Y,Wenke Lee,Yian Huang.Intrusion detection techniques for mobile wireless networks.ACM J.Wireless Net.,Sept.,2003,9(5):45~56.
  • 7Oleg Kachirski,Ratan Guha.Effective intrusion detec-tion using multiple sensors in wireless Ad Hoc networks.IEEE HICSS,Hawaii,Jan.,2003.
  • 8Yian Huang,Wenke Lee.A cooperative intrusion de-tection system for Ad Hoc networks.Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax,Virginia,2003.
  • 9P Albers.Security in Ad Hoc networks: a general intrusion detection architecture enhancing trust based approaches.1st Int'l.Wksp.Wireless Info.Sys.,Ciudad Real,Spain,Apr.,2002.3~6.

同被引文献18

  • 1刘力军,李卓伟.基于异常的无线移动网络入侵检测系统[J].计算机工程与应用,2006,42(14):165-168. 被引量:1
  • 2田俊峰,张喆,赵卫东.基于误用和异常技术相结合的入侵检测系统的设计与研究[J].电子与信息学报,2006,28(11):2162-2166. 被引量:23
  • 3[4]Amis A D,Prakash R.Load-balancing clusters in wireless ad hoc network.Application-Specific Systems and Software Engineering Technology,2000.Proceedings.3rd IEEE Symposium on,2000,24-25.
  • 4[5]A ValdesK.Skinner.Probabilistic alert correlation.In:Proc of the 4th Int'l Symposium on Recent Advances in Intrusion Detection (RAID 2001).2001:54-68.
  • 5[6]Cuppens F,Ortalo R.LAMBDA:A language to model a database for detection of attacks.In:Proc.of Recent Advances in Intrusion Detection(RAID 2000),2000:197-216.
  • 6[7]Peng Ning,Yun Cui,Douglas S Reeves.Constructing Attack Scenarios through Correlation of Intrusion Alerts.CCS' 02,Washington DC,USA.2002.
  • 7[8]S Templeton,K Levit.A requires/provides model for computer attacks.In:Proc of New Security Paradigms Workshop.2000:31-38.
  • 8谢冬青,冷健,熊伟.计算机网络安全技术教程[M].北京:机械工业出版社,2006.
  • 9Y.Zhang,W.Lee.Intrusion detection in wireless ad hoc networks[C].Proc.6th Int'l.Conf.Mobile Comp.Net(MobiCom 2000),Aug.2000,275-283.
  • 10A Mishra,K.Nadkarni,A.Patcha.Intrusion Detection in Wireless Ad Hoc Networks[J].IEEE Wireless Communications,2004,11(1):48-60.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部