期刊文献+

基于异常的无线移动网络入侵检测系统 被引量:1

A Anomaly-based Intrusion Detection System in Mobile Wireless Networks
下载PDF
导出
摘要 论文介绍了无线移动网络中的各种可能的入侵手段,分析了在无线移动环境下的入侵检测技术及实现思想,给出了一个无线移动网络入侵检测系统的基本概念框架,并对其中的各个模块进行了分析。 The various possible intrusions in a mobile wireless network are introduced ,Based on the analyses of intrusion detection teehniques,a general wireless intrusion detection framework is proposed to detect the anomalies/intrusions in MWNs ,and a description of each component of the framework is provided.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第14期165-168,共4页 Computer Engineering and Applications
关键词 无线移动网络 入侵检测 异常检测 Mobile Wireless Networks, intrusion detection, anomaly detection
  • 相关文献

参考文献5

  • 1S Buchegger,J Y L Boudec.Performance Analysis of the CONFIDANT Protocol[C].In:Proc 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc'02),Lausanne,Switzerland,2002.
  • 2Y Huang et al.Cross-feature analysis for detecting ad-hoc routing anomalies[C].In:Proceedings of ICDCS,2003.
  • 3B Sun,K Wu,U W Pooch.Alert aggregation in mobile ad hoc networks[C].In:Proceedings of the 2003 ACM workshop on Wireless security,ACM Press,2003:69~78.
  • 4Y Zhang et al.Intrusion detection techniques for mobile wireless networks.Wireless Networks,2003 ;9 (5):545~556.
  • 5S Rajavaram et al.Neighborhood Watch:An Intrusion Detection and Response Protocol for Mobile Adhoc Networks[C].In:Proceedings of Student Research Conference,UMBC,2002.

同被引文献12

  • 1郭小兵.无线移动Ad Hoc网络中的入侵检测技术[J].交通与计算机,2005,23(5):76-79. 被引量:2
  • 2田俊峰,张喆,赵卫东.基于误用和异常技术相结合的入侵检测系统的设计与研究[J].电子与信息学报,2006,28(11):2162-2166. 被引量:23
  • 3谢冬青,冷健,熊伟.计算机网络安全技术教程[M].北京:机械工业出版社,2006.
  • 4Y.Zhang,W.Lee.Intrusion detection in wireless ad hoc networks[C].Proc.6th Int'l.Conf.Mobile Comp.Net(MobiCom 2000),Aug.2000,275-283.
  • 5A Mishra,K.Nadkarni,A.Patcha.Intrusion Detection in Wireless Ad Hoc Networks[J].IEEE Wireless Communications,2004,11(1):48-60.
  • 6Piya Techateerawat,Andrew Jennings.Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Network[C].IEEE WIC,2006:227-230.
  • 7S.Doumit.D.P.Agrawal.Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network[C].IEEE Military Communications Conference,2003,22(1):609-614.
  • 8C.-C.Su,K.-M.Chang,Y.-H.Kuo,M.-F.Horng.The new intrusion prevention and detection approaches for clustering-based senfor networks[C].IEEE Wireless Commuications and Networking Conference,Mar.2005,13-17.
  • 9A.Agah,S.Das.K.Basu,M.Asadi.Intrusion detection in sensor networks:A non-cooperative game approach[C].3rd IEEE Inter national Symposium on Network Computing and Applications,Boston,MA,Aug,2004,343-346.
  • 10P.Brutch,C.Ko.Challenges in intrusion detection for wireless ad-hoc networks[C].Applications and the Internet Workshops Symposium,2003,368-373.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部