期刊文献+

基于移动代理的移动Ad Hoc网络入侵检测系统 被引量:3

Mobile Agent-Based Intrusion Detection System for Mobile Ad Hoc Network
在线阅读 下载PDF
导出
摘要 移动Ad Hoc网络作为一种新型的无线移动通信网络,在军事和民用上都有广泛的应用。由于其动态拓扑、无线通信的特点,易于遭受各种安全威胁。入侵检测是解决移动Ad Hoc网络安全问题的最重要技术之一。本文在分析了当前入侵检测系统体系结构的基础上,给出了一种基于移动代理的移动Ad Hoc网络入侵检测系统模型。该系统联合采用误用检测和异常检测方法,具有较高的检测效率和较低的误报率。 As a new type of wireless mobile communication system,mobile Ad Hoc network has been increasingly being used both in military and civilian uses.However,it is very vulnerable to attacks due to its dynamic changing topology,open medium and so on. Therefore,intrusion detection can be one of the most important technologies for securing mobile Ad Hoc network.This paper proposes a mobile agent-based intrusion detection system model after analyzing the proposed intrusion detection system architectures.This system utilizes both misuse detection and anomaly detection mechanism thus it has high efficiency and low false positive rate in detection.
出处 《微计算机信息》 2010年第12期3-5,共3页 Control & Automation
基金 基金申请人:施荣华 项目名称:移动自组网中移动敌手及欺骗问题的研究 基金颁发部门:国家自然科学基金委(60773013)
关键词 移动AD Hoc网络(MANET) 安全 移动代理 入侵检测系统 Mobile Ad Hoc Network (MANET) Security Mobile Agent Intrusion Detection System
  • 相关文献

参考文献9

  • 1Mobile Ad-Hoc Networks (MANET) [EB/OL].http://www.ietf.org/ html.charters/manet-charter.html.
  • 2施荣华,颜艳华.移动自组网中的移动敌手防御[A].第九届国际青年计算机科学家会议.2026-2031,2008.
  • 3Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad Hoc Network [J]. Proc. MOBICOM 2000, Boston, ACM press, 2000: 275 -283.
  • 4T. Anantvalee, J. Wu. A Survey on Intrusion Detection in Mobile Ad Hoe Networks [J]. Wireless/Mobile Network Security: Springer 2006, Ch7, 170-196.
  • 5S. Marti. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks [J]. Proc. 6th Annual International Conf. Mobile Comp. and Net, 2000(8): 255-265.
  • 6B.Sun, K.Wu and U.Pooch. Alert Aggregation in Mobile Ad Hoc Networks [J]. ACM Wireless security (WISE.03), San Diego, CA, 2003:69-78.
  • 7O. Kachirski and R. Guha. Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks [J]. Knowledge Media Net, Proc. IEEE Workshop, 2002(7): 153-158.
  • 8Farhan A. F., Zulkhairi D., M.T.Hatim. Mobile Agent Intrusion Detection System For Mobile Ad Hoc Networks: A Non-overlapping Zone Approach [J]. Internet, 2008.ICI 2008.4th IEEE/ IFIP International Conference, 2008.9: 1-5.
  • 9朱婷婷,赵林.一种应用移动代理的Ad-hoc网络IDS模型[J].微计算机信息,2009,25(3):144-145. 被引量:2

二级参考文献5

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA, 2000.275-283
  • 3Hohl F. Time limited blackbox security: protecting mobile agents from malicious hosts, in:G. Vigna (Ed.),4 Mobile Agents and Security, Lecture Notes in Computer Science 1419. Springer, Berlin, 1998.92-113
  • 4Venktraman L.Secured muting protocol for ad-hoc networks[A]. Master' s Thesis [C].University of Cincinnati Houston; Thames& Hudson, 2000.
  • 5苟建兵,惠晓威,贾宏雨.数字移动通信系统中越区切换的计算机模拟[J].微计算机信息,2004,20(4):113-114. 被引量:4

共引文献1

同被引文献16

  • 1Yedidyah Langsam, Moshe J.Augenstein, Aaron M.Tenenbaum[美]李化译.数据结构C和C++语言描述[M].北京清华大学出版社2004.225-270.
  • 2Wind River[美],王金刚等译.VxWorks程序员指南[M].北京清华大学出版社2003.130-165.
  • 3刘勇,英春,史美林.自组网的安全问题[J].计算机世界,2000,44(C):14-15.
  • 4B.Sun,K.Wu,U.Pooch.Alert Aggregation in Mobile Ad Hoc Networks. ACM Wireless security . 2003
  • 5O.Kachirski,R.Guha.Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. Knowledge Media Net,Proc.IEEE Workshop . 2002
  • 6Djenouri D,Khelladi L,Badache AN.A survey of security issues in mobile ad Hoc and sensor networks. Communications Surveys and Tutorials, IEEE . 2005
  • 7Yih-Chun Hu,Adrian Perrig.A survey of secure wireless ad hoc routing. Security and Privacy Magazine, IEEE . 2004
  • 8P. G. Argyroudis,D. O‘Mahony.Secure routing for mobile ad hoc networks. IEEE Communications Surveys & Tutorials . 2005
  • 9许芷岩,刘明,孙艳歌.Ad Hoc网络中基于测度的冲突受限算法[J].计算机工程,2007,33(24):115-117. 被引量:2
  • 10李金鹏,吕光宏,王立平,薛强.移动Ad hoc网络安全路由协议研究[J].计算机技术与发展,2008,18(7):24-28. 被引量:10

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部