期刊文献+

D-S证据理论在Ad hoc网络入侵检测中的应用分析

Application analysis of intrusion detection using D-S theory of evidence in Ad hoc networks
下载PDF
导出
摘要 由于Adhoc网络没有一个固定的结构,入侵检测只能通过节点进行。一个分布式入侵检测系统需要联合多节点数据进行检测,但是却不能保证这些节点都是可靠的。D-S证据理论考虑了不确定度的概念,可以很好的解决这个问题,更为重要的是,Dempster规则可以从一些不可靠节点融合证据。从可信度入手,给出了初始化过程,并对D-S证据理论融合多节点证据过程进给出了具体的分析。 Without a fixed infrastructure,Ad hoc networks must distribute intrusion detection among their nodes.A distribute intrusion detection system needs to combine data from multiple nodes to carry out the detection,but the observing nodes may not be reliable.D-S theory of evidence considers the concept of uncertainty,and is well suited for this type of problem.Moreover, Dempster's role for combination fuse together multiple pieces of evidence from some unreliable nodes.The paper starts with reliability and gives the process of initialization and gives the material analysis of the process of fusing together multiple nodes'data using D-S theory of evidence.
作者 任登泉
出处 《计算机工程与应用》 CSCD 北大核心 2008年第35期95-97,共3页 Computer Engineering and Applications
关键词 AD HOC网络 D—S证据理论 入侵检测 可信度 Ad hoc networks D-S theory of evidence intrusion detection reliability
  • 相关文献

参考文献9

  • 1Royer E,Toh C K.A review of current protocols for Ad hoc mobile wireless networks[J].IEEE Personal Communications, 1999.
  • 2Marti S,Giuli T,Lai K.Mitigating routing misbehavior in mobile Ad hoc networks[C]//Proceeding of MOBICOM,2000.
  • 3Pearl J.Probabilistic reasoning in intelligent systems:networks of plausible inference[M].[S.l.].Morgan Kaufmann, 1988.
  • 4Kargl F.Sensors for detection of misbehaving nodes in MANETs[C]//Proc Detection of Intrusion and Malware and Vulnerability Assessment (DIMVA 2004), 2004.
  • 5Zhang Y,Lee W.Intrusion detection in wireless Ad hoc networks[C]// Proc 6th Ann ACM Int'l Conf Mobile Computing and Networking[S.1.]: ACM Press,2000 : 275-283.
  • 6Michiardi P,Molva R.Core:a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks [C]//IFIP Communication and Multimedia Security Conference,2002.
  • 7Chen T M,Venkataramanan V.Dempster-shafer theory for intrusion detection in Ad hoc networks[J].IEEE Internet Computing,2005,6(9).
  • 8Buchegger S,Le Boudec J Y.Performance analysis of the CONFIDANT protocol:cooperation of nodes fairness In dynamic Ad-hoc networks[C]//Proc 3rd ACM Int'l Syrup Mobile Ad Hoc Networking and Computing.[S.l.]:ACM Press,2002.
  • 9Zhou L,Haas Z.Securing Ad hoe networks[J].IEEE Network,1999,13 (6) : 24-30.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部