期刊文献+

Ad Hoc网络的入侵检测技术研究 被引量:6

Study on Intrusion Detection in Ad Hoc Networks
原文传递
导出
摘要 Ad Hoc网络是一种没有固定基础设施、网络拓扑不断变化的新型网络,固有的脆弱性使它容易受到攻击,给Ad Hoc的入侵检测带来更多挑战。文中介绍了入侵检测技术及其分类,并根据Ad Hoc网络自身的特性,总结了已有的适于Ad Hoc网络的新型的入侵检测技术及其特性。最后,提出一种基于簇的分布式入侵检测技术,对其关键技术和工作机制进行分析和阐述。 Ad Hoc network is a novel networks. It has no fixed infrastructure and its network topology is constantly changing. The inherent vulnerabilities of wireless Ad Hoc networks make them susceptible to attacks, bring more challenge to the intrusion detection of Ad Hoc networks. Intrusion detection technology and its classification is described in this article. And based on the features of Ad Hoc network, the existing new network intrusion detection technology and its characteristics suitable for AdHoc network are summarized. Finally, the cluster-based distributed intrusion detection technology is proposed, including analysis and discussion on its key technology and working mechanism.
出处 《通信技术》 2008年第1期99-101,共3页 Communications Technology
关键词 AD HOC网络 入侵检测系统 分布式系统 Ad Hoc networks intrusion detection system distributed system
  • 相关文献

参考文献6

  • 1Macker J ,Corson S. Mobile Ad Hoc Networks (MANET)[EB/OL]. Http://www. ietf. org/html . charter/manet - charter. Html, 1997.
  • 2Zhou L D, Hass Z J. Securing Ad Hoc networks[J]. IEEE Networks Special Issue on Network Security, 1999, 7(06):24-30.
  • 3Dai Y X, Lian Y F, Wang H. System Security and Intrusion Detection[M]. Beijing: Tsinghua Publishing Company, 2002.
  • 4Kachirski O, Guha R. Intrusion Detection Using Mobilc Agents in Wireless Ad Hoc Networks[C]. IEEE, July 2002:10-12.
  • 5Amitabh M, Ketan N, Animesh P, et al. Intrusion Detection in Wireless Ad Hoc Networks[J]. IEEE Wireless Communications, 2004, (02):48-60.
  • 6冯建新,王光兴.MAIDS—Ad Hoc网络的多层分布式入侵检测系统[J].小型微型计算机系统,2004,25(12):2195-2198. 被引量:6

二级参考文献9

  • 1Zhang Y, Lee W, Huang Y A. Security in ad hoc network: a general intrusion detection architecture enhancing trust based approaches[J]. Mobile Networks and Applications, 2001, 1(16): 1-16.
  • 2Hong X, Gerla M, Pei G, Chiang C C. A group mobility model for ad hoc wireless networks[C]. Proceedings of ACM/IEEE MSWiM'99, Seattle, WA, Augst 1999, 53-60.
  • 3Asokan N, Ginzboorg P. Key agreement in ad hoc networks[J]. Computer Communications, 2000, 23: 1627-1637.
  • 4Hauser R, Przygienda T, Trudik G. Lowing security overhead in link state routing [J]. Computer Networks, 1999, 31: 885-894.
  • 5Lee W, Park C T, Stolfo S J. Automated intrusion detection using NFR: methods and experiences[C]. Proceedings of the workshop on intrusion detection and network monitoring, Santa Clara, California, USA, April 1999, 9-12.
  • 6Lippmann R, Haines J W, Fried D J, Korba J, Das K. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks-the International Journal of Computer and Telecommunications Networking, 2000, 34(4): 579-595.
  • 7Hubaux J P, Buttyan L, Capkun S. The quest for security in mobile ad hoc networks[C]. Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001.
  • 8Zhou L, Haas Z J. Securing ad hoc networks[J]. IEEE Networks, 1999, 13(6):24-30.
  • 9Lee W, Xiang D. Information-theoretic measures for anomaly detection[C]. 2001 IEEE Symp. on Security and Privacy, Oakland, CA, May 2000.

共引文献5

同被引文献26

  • 1安德智.Ad hoc网络的入侵检测系统研究[J].微计算机信息,2008,24(9):79-81. 被引量:3
  • 2董慧,柴乔林.具备Internet接入功能Ad hoc互联网关设计[J].华中科技大学学报(自然科学版),2003,31(S1):92-94. 被引量:2
  • 3高平利,任金昌.基于Snort入侵检测系统的分析与实现[J].计算机应用与软件,2006,23(8):134-135. 被引量:24
  • 4蒋盛益,姜灵敏.一种高效异常检测方法[J].计算机工程,2007,33(7):166-168. 被引量:7
  • 5Macker J, Corson S. Mobile Ad Hoc Networks(MANET). Http://www.ietf.org/html.charter/manet-charter. Html, 1997
  • 6Mukherjee B, Heberlein T L, Levitt K N. Network Intrusion Detection. IEEE Network 1994, 8(3):26-41
  • 7Amitabh M, Ketan N, Animesh P, et al. Intrusion Detection in Wireless Ad Hoc Networks.IEEE Wireless Communications, 2004, (02):48-60
  • 8Weniger K, Zitterbart M. Ipv6 Autoconfiguration in Large Scale Mobile Ad Hoc Networks[C].Florence, Italy:European Wireless, 2002(1): 142-148.
  • 9Park J S, Kim Y J, Park S W. Stateless Address Autoconfiguration in Mobile Ad Hoc Networks Using Site-Local Address[D].IETF: Mobile Ad Hoc Networking Working Group, 2002.
  • 10Jeong J, Park J, Kim H. Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks[C]. Busan, Korea:Computer Science, 2004:257-267.

引证文献6

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部