期刊文献+

一种基于域的无线Ad HOC网络入侵检测系统 被引量:1

A kind of intrusion detection system of wireless Ad Hoc ethernet based on domain
下载PDF
导出
摘要 无线Ad Hoc网络因其高度动态的拓扑、无线链路、无固定基础设施的支持等一些特性使得它与其他网络相比是非常脆弱的。现有针对有线网络开发的IDS很难适用于这种网络。提出一种称为ZBIDS(Zone-Based Intrusion Detection System)的入侵检测系统,该系统采用两级层次化结构,属于分布式IDS。ZBIDS系统通过基于马尔可夫链的分类器来检测具有序列化特征的入侵。仿真结果表明,基于马尔可夫链的分类器具有较好的入侵检测性能。 Wireless Ad Hoc ethernet is comparatively vulnerable its characteristics such as dynamic topology, wire- less connection and non-fixed foundation. The current IDS which are developed to suit network connection can't adapt to the wireless one. This essay suggests the Zone-Based Intrusion Detection System (ZBIDS) which adopts two-stage hierarchical structure, belonging to distributive IDS. The ZBIDS can detect the ordered intrusion by the Markov chain classifier. The simulation results show that the Markov chain classifier can better detect the intrusion.
作者 龚媛媛
出处 《计算机工程与应用》 CSCD 2012年第28期123-126,134,共5页 Computer Engineering and Applications
关键词 入侵检测系统 无线AD HOC网络 基于域的入侵检测系统 intrusion detection system wireless Ad Hoc networks Zone-Based Instrusion Detection System(ZBIDS)
  • 相关文献

参考文献6

  • 1Zhang Y, Lee W.Intrusion detection in wireless Ad Hoc networks[C]//The 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, 2000 : 275-283:.
  • 2Huang Y, Fan W.Cross-feature analysis for detecting Ad-hoc routing anomalies[C]//The 23rd International Conference on Distributed Computing Systems, Providence, 2003 : 478-487.
  • 3Hu Y, Perrig A, Johnson D B.Rushing attacks and denfense in wireless Ad Hoc network routing protocols[C]// The 2003 ACM Workshop on Wireless Security, San Diego, CA, 2003 : 30-40.
  • 4Debar H, Dacier M.A revised taxonomy for intrusiondetection systems[C]//Annales des Telecom, 2000, 55: 361-378.
  • 5Jiang H.Research on key technologies for mobile Ad hoc networks[D].Southeast Univ ns Notes and Documentation, LBLN, 1999.
  • 6Johnson D B, Maltz D A.Dynamic Source Routing in Ad-hoc wireless networks[C]//Mobile Computing, Kluwer Ld, 1996: 153-181.

同被引文献15

  • 1Colombo M,Lazouski A,Martinelli F,et al.Access and usage control in grid systems[M]//Handbook of Information and Communication Security.Berlin:Springer,2010:293-308.
  • 2Omar M,Challal Y,Bouabdallah A.Certification-based trust models in mobile Ad hoc networks:a survey and taxonomy[J].Journal of Network and Computer Applications,2012,35(1):268-286.
  • 3Gupta B,Kaur H,Namita N,et al.Trust based access control for grid resources[C]//Proc of International Conference on Communication Systems and Network Technologies.2011:678-682.
  • 4Morales R,Serna J,Medina M.A policy-based authorization scheme for resource sharing in pervasive environments[M]//ISSE 2010 Securing Electronic Business Processes.2011:271-279.
  • 5Moslehi K,Kumar R.A reliability perspective of the smart grid[J].IEEE Trans on Smart Grid,2010,21(1):57-64.
  • 6Luo Junzhou,Ni Xudong,Yong Jianming.A trust degree based access control in grid environments[J].Information Sciences,2009,179(15):2618-2628.
  • 7Cho J H,Swami A,Chen L R.A survey on trust management for mobile Ad hoc networks[J].IEEE Communications Surveys & Tutorials,2011,13(4):562-583.
  • 8Zhao Han,Liu Xiaoxin,Li Xiaolin.A taxonomy of peer-to-peer desktop grid paradigms[J].Cluster Computing,2011,14(2):129-144.
  • 9Cho J H,Swami A,Chen L R.Modeling and analysis of trust mana-gement with trust chain optimization in mobile Ad hoc networks[J].Journal of Network and Computer Applications,2012,35(3):1001-1012.
  • 10Torkestani J A.Mobility-based backbone formation in wireless mobile Ad hoc networks[J].Wireless Personal Communications,2013,71(4):2563-2586.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部