期刊文献+

Ad Hoc网络的一种入侵检测模型 被引量:1

An Intrusion Detection Model for Ad Hoc Network
下载PDF
导出
摘要 对Ad Hoc网络的路由安全性问题进行了研究,提出了一种分布式网络协作入侵检测模型,该模型建立在路由协议之上,针对不同的路由协议,分析其安全漏洞,总结攻击行为的判定规则,进行本地入侵检测;在此基础上,以多点协作的联合检测机制提高检测的正确率;并从节省网络资源的角度对入侵检测模型进行优化配置.以AODV路由协议为例介绍了该模型的工作机制,利用仿真软件NS2搭建网络仿真平台进行仿真实验,结果表明,该检测模型能更好地保障网络安全. The issue of routing security in ad hoc network was studied. An intrusion detection model in cooperation with distributed network is proposed for ad hoc networks, based on routing protocols. Analyzing the flaws in security for different routing protocols and summarizing the rules of judging attack behavior, local intrusion detection was conducted. Each host run local IDS, and its detection result would be gathered for such cooperative intrusion detection. In this way, the detection probability increases while the false detection probability decreases. To save the resources of the entire network, an optimized configuration scheme is proposed. The AODV route protocol was taken as example to describe the working mechanism of this model of which the performance was simulated with NS2 ( Network Simulation) software. Simulation results indicated that it can safeguard well the network against intruders and maintain the network performance.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第7期739-742,共4页 Journal of Northeastern University(Natural Science)
基金 国家高技术研究发展计划项目(2002AA784030)
关键词 AD HOC网络 分布式协作入侵检测 有限状态机 联合检测 优化配置 mobile ad hoc networks distributed intrusion detection finite state machine cooperative detection optimized configuration
  • 相关文献

参考文献10

  • 1赵志峰,郑少仁.Ad hoc网络体系结构研究[J].电信科学,2001,17(1):14-17. 被引量:70
  • 2Brent R,Waters E W,Felten A S.Receiver anonymity via incomparable public keys[A].Proceedings of the 10th ACM Conference on Computer and Communications Security[C].Washington:ACM,2003.112-121.
  • 3况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法[J].软件学报,2004,15(5):757-766. 被引量:18
  • 4Papadimitratos P,Haas Z,Secure routing for mobile ad hoc networks[A].Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference[C].San Antonio:TX,2002.27-31.
  • 5Hu Y C,Perrig A,Johnson D B.Ariadne:a secure on-demand routing protocol for ad hoc networks[A].Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking(MobiCbm 2002)[C].Atlanta:ACM,2002.12-23.
  • 6Hu Y C,Johnson D B,Perrig A.SEAD:secure efficient distance vector routing for mobile wireless ad hoc networks[A].Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications(WMCSA 2002)[C].NY:IEEE Computer Society,2002.3-13.
  • 7Zhang Y G,Lee W,Huang Y A.Intrusion detection techniques for mobile wireless networks[J].ACM/Kluwer Wireless Networks Journal,2003,9(5):545-556.
  • 8张庆生.基于Agent技术的入侵检测系统设计与实现[J].计算机工程与设计,2004,25(11):2067-2069. 被引量:3
  • 9Kachirski O,Guha R.Effective intrusion detection using multiple sensors in wireless ad hoc networks[A].Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03)[C].Big Island:IEEE Computer Society,2003.102-110.
  • 10Perkins C E,Royer E M,Das S R.Ad hoc on-demand distance vector routing(AODV)[EB/OL].http:∥www.ietf.org/internet-drafts/draft-ietf-manet-aodv-12.txt,2002-11.

二级参考文献11

  • 1Gordeev Mikhail. Intrusion detection:techniques and approaches[EB/OL].http://www.infosys. tuwien.ac.at/Teaching/Courses/AK2/vor99/t13/.
  • 2Herve Daba, Marc Daciev, Andreas Wespsi. Towards a taxo-nomy of intrusion-detection systems[EB/OL]. Http://domino. Watson.ibm. Com/library/cyberdig. Nsf/0/db3e02d6c2322edd 852566340036757c? OpenDocument.
  • 3Ptacet Thomas H. Insertion, evasion, and denial of service: Eluding network intrusion detection[EB/OL]. http://secinf.net/info/ids/idspaper/idspaper.html.
  • 4Mark Crosbie, Eugene Spafford. Active defense of a computer system using autonomous agents[EB/OL]. http://www.cs. purdue.edu/homes/spaf/tech-reps/9508.ps.
  • 5Midori ASAKA, Shunji OKAZAWA. A method of tracing intruders by use of mobile agent[EB/OL].http://www.isoc.org/inet99/proceedings/4k/4k_2.htm.
  • 6Jai Sundar Balasubramaniyan,Jose Omar Garcia-Fernandez, David Isacoff.An Architecture for intrusion detection using autonomous agents[Z].Coast Lab Purdue Univ West Lafayette.
  • 7Richard Stevens W. TCP/IP 详解.卷1:协议(英文版)[M]. 北京:机械工业出版社, 2002.
  • 8杨向荣,宋擒豹,沈钧毅.入侵检测技术研究与系统设计[J].计算机工程与应用,2001,37(16):1-4. 被引量:22
  • 9杨向荣,宋擒豹,沈钧毅.基于数据挖掘的智能化入侵检测系统[J].计算机工程,2001,27(9):17-18. 被引量:31
  • 10况晓辉,张念,胡华平.移动自组网络环境下组密钥管理协议性能分析[J].计算机工程与科学,2004,26(3):4-7. 被引量:4

共引文献87

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部