期刊文献+

Ad hoc网络中基于状态检测的入侵防护策略

Intrusion Prevention Strategy Based on State Inspection in Ad hoc Networks
下载PDF
导出
摘要 在Ad hoc网络中入侵检测问题已经成为研究热点,本文首先对存在的安全隐患进行了分析描述,然后从会话过滤的角度出发,结合Ad hoc网络自身特点的基础上,提出了一种基于状态检测的入侵防护策略,用于提高整个网络的安全性。 Intrusion prevention in wireless ad hoe networks is a hotspot. This paper firstly analyses the trouble of intru- sion prevention in ad hoc networks, and then proposes an Intrusion Prevention Strategy Based on State Inspection in Ad hoc Networks (IPSI) , derived from the aspect of the session filter. The IPSI can improve the performance of network se- curity while determining to minimize the energy consumption in ad hoc networks.
作者 许芷岩
出处 《湖北第二师范学院学报》 2014年第2期28-30,共3页 Journal of Hubei University of Education
基金 2013年湖北省教育厅研究计划项目(B2013015)
关键词 AD HOC网络 状态检测 入侵防护 ad hoc networks state inspection intrusion prevention
  • 相关文献

参考文献5

二级参考文献29

  • 1Mobile Ad-Hoc Networks (MANET) [EB/OL].http://www.ietf.org/ html.charters/manet-charter.html.
  • 2施荣华,颜艳华.移动自组网中的移动敌手防御[A].第九届国际青年计算机科学家会议.2026-2031,2008.
  • 3Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad Hoc Network [J]. Proc. MOBICOM 2000, Boston, ACM press, 2000: 275 -283.
  • 4T. Anantvalee, J. Wu. A Survey on Intrusion Detection in Mobile Ad Hoe Networks [J]. Wireless/Mobile Network Security: Springer 2006, Ch7, 170-196.
  • 5S. Marti. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks [J]. Proc. 6th Annual International Conf. Mobile Comp. and Net, 2000(8): 255-265.
  • 6B.Sun, K.Wu and U.Pooch. Alert Aggregation in Mobile Ad Hoc Networks [J]. ACM Wireless security (WISE.03), San Diego, CA, 2003:69-78.
  • 7O. Kachirski and R. Guha. Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks [J]. Knowledge Media Net, Proc. IEEE Workshop, 2002(7): 153-158.
  • 8Farhan A. F., Zulkhairi D., M.T.Hatim. Mobile Agent Intrusion Detection System For Mobile Ad Hoc Networks: A Non-overlapping Zone Approach [J]. Internet, 2008.ICI 2008.4th IEEE/ IFIP International Conference, 2008.9: 1-5.
  • 9Ryu Y U and Rhee H S.Evaluation of intrusion detection systems under a resource constraint.ACM Transactions on Information and Systems Security,2008,11(4):20.1-20.24.
  • 10Musman S and Flesher P.System or security managers' adaptive response tool[C].DARPA Information Survivability Conference and Exposition 2000,Hilton Head,USA,2000,Vol.2:1056-1060.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部