期刊文献+

基于时间自动机的Ad hoc网络入侵检测 被引量:4

Intrusion Detection Based Timed Automata for Ad hoc Networks
下载PDF
导出
摘要 该文提出一种基于时间自动机分布式合作的入侵检测算法。首先,将整个网络分为子区域,每一区域随机选出簇头担任监视节点,负责本区域的入侵检测。其次,按照路由协议构筑节点正常行为和入侵行为的时间自动机,监视节点收集其邻居节点的行为信息,利用时间自动机分析节点的行为,识别入侵者。该算法不需要事先进行数据训练并能够实时检测入侵行为。最后,通过模拟实验证实了算法的有效性。 In this paper, a distributed intrusion detection approach is proposed based on timed automata. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of ma^mally abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node's behaviour by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第10期2310-2315,共6页 Journal of Electronics & Information Technology
基金 国家863计划项目(2006AA01Z436 2007AA01Z452 2009AA01Z118) 上海市自然科学基金(09ZR1414900)资助课题
关键词 移动AD HOC网络 路由协议 网络安全 入侵检测 时间自动机 Mobile Ad hoc networks Routing protocol Security Intrusion detection Timed automata
  • 相关文献

参考文献12

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Zhang Yong-guang and Lee Wenke. Intrusion detection in wireless Ad-hoc networks[C]. Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, August, 2000: 275-283.
  • 3Zhang Yong-guang and Lee Wenke. Intrusion Detection Techniques for Mobile Wireless Networks. Mobile Networks and Applications, 2003, 9(5): 545-556.
  • 4Kachirski O and Guha R. Intrusion detection using mobile agents in wireless ad hoc networks. IEEE Workshop on Knowledge Media Networking (KMN'02), Kyoto, Japan, 2002: 153-158.
  • 5Puttini R S, Percher J M, and Me L, et al.. A modular architecture for distributed IDS in MANET[C]. Proceedings of the 2003 International Conference on Computational Science and Its Applications (ICCSA 2003), Springer Verlag, LNCS 2668, San Diego, USA, 2003: 984-990.
  • 6Huang Yi-an and Lee Wenke. A cooperative intrusion detection system for ad hoc networks[C]. 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), Fairfax, VA, USA, October 31, 2003: 135-147.
  • 7Sun B, Wu K, and Pooch U W. Routing anomaly detection in mobile ad hoc networks[C]. Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 03), Dallas, Texas, October 2003: 25-31.
  • 8Albers P, Camp O, Percher J M, and Jouga B, et al.. Security in ad hoc Networks: a general intrusion detection architecture enhancing trust based approaches. Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), Ciudad Real, Spain, Apr. 2002: 1-12.
  • 9Bhargava S and Agrawal D P. Security Enhancements in AODV Protocol for Wireless Ad Hoc Networks[C]. Vehicular Technology Conference, 2001: 2143-2147.
  • 10Wang Wei-chao, Lu Yi, and Bhargava B K. On vulnerability and protection of ad hoc on-demand distance vector protocol[C]. Proceedings of 10th IEEE International Conference on Telecommunication (ICT), Papeete, French Polynesia, 2003: 375-382.

二级参考文献35

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592.

共引文献62

同被引文献44

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部