期刊文献+

一种基于社会网络分析的无线Mesh网络分布式协作入侵检测系统 被引量:1

A Wireless Mesh Network Analysis of Distributed Collaborative Intrusion Detective System
原文传递
导出
摘要 本文研究了无线Mesh网络的结构特点,以及入侵检测系统在解决其安全问题中的重要作用。分析了网络中的监测节点对入侵检测系统检测的准确性、实时性、开销的影响。在此基础上,本文提出一种基于社会网络思想的入侵检测系统监测节点选择方法,并构建出一种分布式协作的入侵检测检测系统。本文提出的监测节点选择方法综合考虑了节点全局中心性和节点间的联系紧密程度,提出的分布式协作结构能有效降低冗余的检测开销,同时保证检测的实时性和监测信息的有效性。 This paper studies the structure characteristics of wireless Mesh networks, and intrusion detection system in the important role of its security problems. Analyzes the monitoring nodes in the network to the intrusion detection system detection accuracy, real-time, the influence of the overhead. On this basis, this paper puts forward a kind of based on social network intrusion detection system monitoring node selection method, and construct a kind of distributed collaborative intrusion detection system detection system. Monitoring node selection method is proposed in this paper considering the contact between the node global centricity and close degree, put forward the distributed cooperation structure can effectively reduce the redundancy detection overhead, at the same time to ensure the effectiveness of the detection and real-time monitoring information.
作者 丁姝郁
机构地区 成都工业学院
出处 《网络安全技术与应用》 2014年第12期29-30,共2页 Network Security Technology & Application
关键词 无线MESH网络 入侵检测系统 社会网络分析 监测节点选择 Wireless Mesh network Intrusion detection system Social network analysis Monitoring node selection
  • 相关文献

参考文献4

  • 1无线网状网络:一项调查[J].计算机网络,2005年,47:445-487.
  • 2在无线网状网络入侵检测使用Hibrid方法[c].EEE国际会议分布式计算系统研讨会.2009年,451-454.
  • 3减轻在移动AdHoc网络路由行为[c].动计算和网络国际会议.2000年,255-265.
  • 4基于代理的分布式协同入侵检测系统[c].际会议通讯网络.2007年,17-22.

同被引文献16

  • 1Anne-Marie Kermarrec,Erwan Le Merrer,Bruno Sericola,Gilles Trédan.??Second order centrality: Distributed assessment of nodes criticity in complex networks(J)Computer Communications . 2010 (5)
  • 2Frank A. Zdarsky,Sebastian Robitzsch,Albert Banchs.??Security analysis of wireless mesh backhauls for mobile networks(J)Journal of Network and Computer Applications . 2010 (2)
  • 3Szott S.Selfish insider attacks in ieee 802.11s wireless mesh networks. IEEE Communications Magazine . 2014
  • 4Butun,I,Morgera,S.D.,Sankar,R.'A Survey of Intrusion Detection Systems in Wireless Sensor Networks,'. Communications Surveys & Tutorials,IEEE . 2014
  • 5Okechukwu E. Muogilim,Kok-Keong Loo,Richard Comley.Wireless mesh network security: A traffic engineering management approach. Journal of Network and Computer Applications . 2011
  • 6Chen W,Yuan Y,Zhang L.Scalable influence maximization insocial networks under the linear threshold model. The 2010IEEE International Conference on Data Mining (ICDM) . 2010
  • 7N. Deb,M. Chakraborty,N. Chaki.The Evolution of IDS Solutions in Wireless Ad-Hoc Networks to Wireless Mesh Networks. Network Security & Applications . 2011
  • 8Yao Yu,Lei Guo,Xingwei Wang,Cuixiang Liu.??Routing security scheme based on reputation evaluation in hierarchical ad hoc networks(J)Computer Networks . 2009 (9)
  • 9Zorana Bankovic,David Fraga,José Manuel Moya,Juan Carlos Vallejo,Pedro Malagón,álvaro Araujo,Juan-Mariano de Goyeneche,Elena Romero,Javier Blesa,Daniel Villanueva,Octavio Nieto-Taladriz.??Improving security in WMNs with reputation systems and self-organizing maps(J)Journal of Network and Computer Applications . 2010 (2)
  • 10Yao Yu,Yuhuai Peng,Yinpeng Yu,Tianyu Rao.??A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks(J)Computers and Electrical Engineering . 2014 (2)

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部