期刊文献+

移动Ad Hoc网络入侵检测研究 被引量:3

Study on Intrusion Detection for Mobile Ad Hoc Network
下载PDF
导出
摘要 介绍了移动Ad Hoc网络入侵检测技术的最新研究进展。提出了移动Ad Hoc网络的特点、安全目标及其脆弱性等,分析了Ad Hoc网络中存在的主要安全威胁和Ad Hoc网络中入侵检测系统结构,并对现有的几种典型Ad Hoc网络入侵检测方案进行了的分类论述,从决策方式、通信机制、检测模式和优缺点几个方面进行综合比较。对移动Ad Hoc中入侵检测技术的选择提出了建设性的建议,并指出了下一步的研究方向。 This paper introduces the developments of techniques for mobile Ad Hoc network, it introduces characteristics of mobile Ad Hoc network, objects of security and vulnerabilities and so on. It analyzes the primary threats in mobile Ad Hoc network and the structure of the intrusion detection system for mobile Ad Hoc network, also discusses present representative solutions for mobile ad hoc network, and makes a comparison on aspects of decision method, communication machine, detection model, merits and faults. It makes some constructive suggestions on selection of intrusion detection techniques in the mobile Ad Hoc network, also presents the area of the further research in the future.
作者 杨清 李方敏
出处 《计算机工程》 CAS CSCD 北大核心 2007年第4期118-120,124,共4页 Computer Engineering
基金 湖南省自然科学基金资助项目(06JJ50132)
关键词 移动AD HOC网 入侵检测系统 自治系统 通信机制 Mobile Ad Hoc network Intrusion detection system (IDS) Autonomy system Communication mechanism
  • 相关文献

参考文献10

  • 1Yi Li,June Wei.Guidelines on Selecting Intrusion Detection Methods in MANET[C]//Proc.of ISECON.2004:1022-1039.
  • 2易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 3蒋廷耀,杨景华,李庆华.移动Adhoc网络安全技术研究进展[J].计算机应用研究,2005,22(2):1-4. 被引量:9
  • 4Zhang,Yongguan,Lee W.Intrusion Detection Techniques for Mobile MANET[J].Wireless Networks Journal,2003,9(5):545-556.
  • 5Oleg K,Guha R.Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks[C]//Proceedings of the 36^th Hawaii International Conference on System Sciences.2002.
  • 6Huang Yian,Lee W.A Cooperative Intrusion Detection System for Ad Hoc Networks[C]//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks.2003.
  • 7Tseng Chin-Yang.A Specification-based Intrusion Detection System for AODV[C]//Proc.of the ACM Workshop on Security of Ad Hoc and Sensor Networks.2003.
  • 8Sun B K,Pooch W U.Routing Anomaly Detection in Mobile ad hoc Networks[C]//Proceedings of the 12^th International Conference on Computer Communications and Networks.2003,20-23.
  • 9Guha R,Kachirski O,Schwartz D G.Case-based Agents for Packet-level Intrusion Detection in Ad Hoc Networks[C]//Proceedings of the 17^th International Symposium on Computer and Information Sciences.2002.
  • 10Huang Y,Fan W,Lee W,et al.Cross-feature Analysis for Detecting Ad-hoc Routing Anomalies[C]//Proceedings of the 23^rd International Conference on Distributed Computing Systems.2003,478-487.

二级参考文献61

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2l Chlamtac, M Conti, et al. Mobile Ad hoc Networking: Imperatives and Challenges[J]. Ad hoc Net works, 2003,1(1) :13-64.
  • 3Luis F G Sarmenta. Sabotage-tolerance Mechanism for Volunteer Computing Systems [ J ]. Future Generation Computer Systems, 2002,18(4) :561-572.
  • 4C Perkins. Highly Dynamic Destination-Sequenced Distance-Vector routing ( DSDV ) for Mobile Computers [ C ]. Proceedings of SIGCOMM, 1994.
  • 5S Murthy, et al. An Efficient Routing Protocol for Wireless Networks[ J ]. Mobile Networks and Applications, 1996,1 ( 2 ) : 183-197.
  • 6C E Perkins, E M Royer. Ad hoc On-demand Distance Vector Routing[J]. IEEE Workshop on Mobile Computing Systems and Applications, 1999,(2) :90-100.
  • 7D B Johnson. Routing in Ad hoc Networks of Mobile Hosts[ C]. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, 1994, ( 12 ) : 158-163.
  • 8K Sanzgiri, B Dahill, et al. A Secure Routing Protocol for Ad hoc Networks [ C ]. Proceedings of the 10th IEEE International Conference on Network Protocols, 2002. 1-10.
  • 9Hongmei Deng,et al. Routing Security in Wireless Ad hoc Networks[J]. IEEE Communications Magazine,2002, (10) :70-75.
  • 10C1 Karlof, D Wager. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures [ J ]. Ad hoe Networks, 2003, ( 1 ) :293-315.

共引文献68

同被引文献25

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部