期刊文献+

Ad hoc网络的入侵检测技术 被引量:2

Intrusion Detection Technology in Ad Hoc Network
下载PDF
导出
摘要 随着无线网络的发展和移动计算应用的快速增加,网络安全问题愈加突出.入侵检测已经从保护固定有线网络扩展到移动无线网络.作为无线移动网络众多实现方式之一的移动Ad hoc网络,由于其与有线网络存在很大差别,现有针对有线网络开发的入侵检测系统很难适用于移动Ad hoc网络.在描述入侵检测技术的相关内容基础上,提出了基于移动Ad hoc网络的多层分布式入侵检测系统模型,并重点分析了在该模型中的协议分析技术. With the rapid development of wireless network and mobile computing, the security of network becomes more important. As one of wireless mobile network, mobile Ad hoe network has new vulnerabilities that do not exist in a fixed wired network, and is susceptible to attacks. This paper introduces some methods which used in intrusion detection system and provides a new model of system based on multi - layer integrated distributed technology, especially recommend the protocol analyzing method in this system.
作者 代伟
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第5期120-123,共4页 Journal of Chongqing University
关键词 AD HOC网络 入侵检测 协议分析 信任域 分布式 Ad hoc network intrusion detection protocol analyzing trusted area distributed
  • 相关文献

参考文献5

  • 1MUKHERJEE B,HEBERLEIN T L,LEVITT K N.Network Intrusion Detection[J].IEEE Network,1994,8(3):26-41.
  • 2YONGGUANG ZHANG,WENKE LEE.Intrusion Detection in Wireless Ad Hoc Networks [Z].In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking,Boston:Massachussetts.August 6-11,2000.
  • 3HUBAUX J P,BUTTYAN L,CAPKUN S.The quest for security in mobile Ad hoc networks [Z].Proceedings of the ACMSymposium on Mobile Ad Hoc Networking and Computing,Chicago,2001.
  • 4ZHOU L,HAAS Z J.Securing Ad Hoc Networks [J ].IEEE Networks,1999,13 (6):24-30.
  • 5ZHANG Y,LEE W.Security in Ad Hoc Network:a General Intrusion Detection Architecture Enhancing Trust Based Approaches [J ].Mobile Networks and Applications,2001,16(1):12-16.

同被引文献6

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部