期刊文献+

自组网中基于簇的入侵检测方案 被引量:1

Cluster-based Intrusion Detection System for Ad Hoc Network
下载PDF
导出
摘要 基于补图团的着色思想提出了分布式分簇算法,并在此基础上给出了一种基于簇的入侵检测方案. A new distributed coloring based clustering method is introduced, based on it, a intrusion detection system is proposed.
出处 《福建师范大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第1期36-40,共5页 Journal of Fujian Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(60502047) 福建省科技厅基金资助项目(2006F5036)
关键词 入侵检测 分簇 聚类算法 自组网 intrusion detection clustering fuzzy clustering Ad Hoc networks
  • 相关文献

参考文献10

  • 1Ram R,Jason R.A brief overview of mobile Ad Hoc networks:challenges and directions[J].IEEE Communications Magazine,2002,40(5):20-22.
  • 2Zhang Y,Lee W.Intrusion detection in wireless Ad hoc networks[C].Boston:Acm Mobicom 2000,2000.
  • 3Zhang Y,Lee W,Huang Y A.Security in Ad hoc network:a general intrusion detection architecture enhancing trust based approaches[J].Mobile Networks and Applications,2001,1(16):1-16.
  • 4Zhang Y,Huang Y A,Lee W.A cooperative intrusion detection system for Ad hoc networks[M].New York:Fairfax ACM Press,2003:135-147.
  • 5冯建新,王光兴.MAIDS—Ad Hoc网络的多层分布式入侵检测系统[J].小型微型计算机系统,2004,25(12):2195-2198. 被引量:6
  • 6Mishra A,Nadkarni K,Patcha A.Intrusion detection in wireless Ad hoc networks[J].IEEE Wireless Communications,2004,11(1):48-60.
  • 7周贤伟,韩旭,覃伯平.MANET中基于簇的多层协同入侵检测模型[J].微计算机信息,2006,22(02X):4-6. 被引量:4
  • 8许力,钱晓聪.移动自组网环境下基于图论的智能优化分簇策略[C]//2005年中国计算机大会论文集.北京:清华大学出版社,2005:10.
  • 9章静,许力,林志伟.自组网中基于簇的混合密钥管理策略[J].计算机应用,2006,26(6):1328-1330. 被引量:4
  • 10Bezdek J C.Parrern recognition with fuzzy objiective function algorithms[M].New York:Plenum Press,1981.

二级参考文献21

  • 1叶阿勇,许力.移动Ad Hoc网络安全策略研究[J].微计算机应用,2004,25(4):385-390. 被引量:5
  • 2余扬,孔梦荣.基于FPGA器件的高速以太网入侵检测系统设计与实现[J].微计算机信息,2005,21(3):205-207. 被引量:8
  • 3Zhang Y, Lee W, Huang Y A. Security in ad hoc network: a general intrusion detection architecture enhancing trust based approaches[J]. Mobile Networks and Applications, 2001, 1(16): 1-16.
  • 4Hong X, Gerla M, Pei G, Chiang C C. A group mobility model for ad hoc wireless networks[C]. Proceedings of ACM/IEEE MSWiM'99, Seattle, WA, Augst 1999, 53-60.
  • 5Asokan N, Ginzboorg P. Key agreement in ad hoc networks[J]. Computer Communications, 2000, 23: 1627-1637.
  • 6Hauser R, Przygienda T, Trudik G. Lowing security overhead in link state routing [J]. Computer Networks, 1999, 31: 885-894.
  • 7Lee W, Park C T, Stolfo S J. Automated intrusion detection using NFR: methods and experiences[C]. Proceedings of the workshop on intrusion detection and network monitoring, Santa Clara, California, USA, April 1999, 9-12.
  • 8Lippmann R, Haines J W, Fried D J, Korba J, Das K. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks-the International Journal of Computer and Telecommunications Networking, 2000, 34(4): 579-595.
  • 9Hubaux J P, Buttyan L, Capkun S. The quest for security in mobile ad hoc networks[C]. Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001.
  • 10Zhou L, Haas Z J. Securing ad hoc networks[J]. IEEE Networks, 1999, 13(6):24-30.

共引文献13

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部