期刊文献+

一种基于移动Agent的移动Ad Hoc网络入侵检测系统 被引量:2

Mobile agents-based intrusion detection system for mobile ad hoc networks
下载PDF
导出
摘要 移动Ad Hoc网络比传统的有线和无线网络面临着更多的安全问题,入侵检测技术可作为第2道安全防线来弥补入侵预防技术的不足;由于移动Ad Hoc网络所具有的特殊性,使得已有的入侵检测系统不适合被运用到移动Ad Hoc网络中。文章设计了一个新的适合移动Ad Hoc网络的基于移动Agent的分布式入侵检测系统,该系统充分考虑了移动Ad Hoc网络资源受限的特点,对整个网络进行了簇的划分并且提出了一个划分簇的算法,进而对不同的Agent进行了合理分配。 Mobile ad hoc networks have more security problems than the conventional wired or wireless networks, and intrusion detection approaches, as a second line of defense, can make up for deficiency of intrusion prevention approaches. However, considering the particularities in mobile ad hoc networks, the present detection approaches are not fit for such networks. In this paper, a novelly distributed intrusion detection system based on mobile agents is put forward for mobile ad hoc networks. In this intrusion detection system, the limited resources have been adequately taken into account. At the same time,to assign different agents reasonably, the whole network is partioned to several clusters and an algorithm for selecting clusters is brought forward.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第4期406-410,共5页 Journal of Hefei University of Technology:Natural Science
关键词 移动AD Hoe网络 移动AGENT 入侵检测 mobile Ad Hoc network mobile Agent cluster intrusion detection
  • 相关文献

参考文献8

  • 1Zhou L, Haas Z J. Securing ad hoc networks[J]. IEEE Network Magazine, Special Issue on Network Security, 1999,13(6):24-30.
  • 2Zhang Y, Lee W, Intrusion detection in wireless ad-hoc networks[J/OL], http://dependability.cs. virginia. edu/bibliography/p275-zhang, pdf, 2004-10-10.
  • 3Marti S. Giuli T, Lai K, et al. Mitigating routing misbehavior in mobile ad hoc networks[J/OL], http://www.hpl.hp. com/personal/Kevin_ Lai/projects/adhoc/mitigating.pdf, 2004-10-20.
  • 4Albers P, Camp O, Percher J M, et al, ,Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approach[J/OL], http://www.rennes.supelec. fr/ren/rd/ssir/publis/wis02_albers_camp_percher_als. pdf, 2004-11-03.
  • 5Smith A B. An examination of an intrusion detection architecture for mobile ad hoc networks[J/OL], http://cisse, info/CISSE%20J/2001/Smit. pdf, 2004-11-04.
  • 6Chan P C, Wei V K. Preemptive distributed intrusion detection using mobile agents[J/OL], bttp://doi, ieeecomputersociety, org/10. 1109/ENABL. 2002. 1029996.
  • 7Rappaport S. Wireless communications; principles and practice[M]. Upper Saddle River, NJ:Prentice Hall, 1995.72-75.
  • 8Bae S H, Lee S J, Su W, et al. The design,implementation and performance evaluation of the on-demand multicast routing protocols in multihop wireless networks[J]. IEEE Network,2000,14(1):70-77.

同被引文献15

  • 1况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 2张庆生.基于Agent技术的入侵检测系统设计与实现[J].计算机工程与设计,2004,25(11):2067-2069. 被引量:3
  • 3尹其斌,何炎祥.Ad Hoc网络中一种基于信任域值的IDS模型的设计[J].计算机工程与科学,2006,28(6):41-43. 被引量:1
  • 4Zhang Y,Lee W.Intrusion detection in wireless ad-hoc networks[J/OL].http://dependability.cs.virginia.edu/ bibliography/p275-zhang.pdf,2004-10-10.
  • 5Albers P,Camp O,Percher J M,et al.Security in ad-hoc networks:a general intrusion detection architecture enhancing t rust based approach[J/OL].http://www.rennes.supelec.fr/ren/rd/ss ir/publis/wis02_albers_camp_percher_als.pdf,2004-11-03.
  • 6Smith A B.An examination of an intrusion detection architecture for mobile ad hoc networks[J/OL].http://cisse.info/CISSE%20J/2001/Smit.pdf,2004-11-04.
  • 7A.Mishra,K.Nadkami,.A.Patcha.Intrusion detection in wireless ad hoc nerworks[J].IEEE Wireless Communications,vol.11,no.1,pp.48-60,February 2004.
  • 8Hong X,Gerla M,Per G,Chiang C C.A group mobility model for ad hoc wireless networks[C].Proceedings of ACM/IEEE M SW M'99,Seattle,WA,Augst 1999:53-60.
  • 9A sokan N,Ginzboorg P.Key agreement in ad hoc networks[J].Computer Communications,2000.
  • 10Brent R, Waters E W, Felten A S. Receiver anonymity via incomparable public keys. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, ACM, 2003. 112-121.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部