期刊文献+

MANET的IDS中移动代理部署算法的研究 被引量:1

Research of the Mobile Agent Disposal Algorithm in MANET IDS
下载PDF
导出
摘要 MANET(移动自组织网络)由于采用无线信道、分布式控制等原因,比有线网络更易受到安全威胁。MANET对带宽和计算量的敏感性使得移动代理成为MANET安全架构的首选。文中介绍了一种基于移动代理的MANET的入侵检测系统(IDS)模型。重点分析了该模型中的网络监测代理的部署算法,并基于已有的算法提出了一种改进算法———IDANMA(Improved D isposal A lgorithm forNetwork Mon itoring Agent)。IDANMA通过两轮投票选举在规定通信半径内可达节点最多的节点为网络监测代理节点。用NS软件对IDANMA进行仿真的结果表明,IDANMA有效地克服了已有算法的缺陷,通信开销更小,网络监测代理分布更均匀,算法收敛性好。 MANET is more vulnerable to intrusion than wire networks, as it operates in wireless channel and employs distributed control mechanisms. MANET is sensitive to bandwidth and computation, which makes mobile agents the first choice for security framework in MANET. After introducing a Mobile Agent Based IDS Model for MANET, this paper focuses on the analysis of the disposal algorithm of network-monitoring agent, and proposes an improved algorithm-IDANMA based on an existing algorithm. IDANMA elects the node, which has most reachable nodes in given communication radius, as the network-monitoring agent through two-time voting. The results of simulating IDANMA on NS have shown that IDANMA has effectively overcome the limitation of the existing algorithm. It is of lower communication cost, better uniform distribution of network-monitoring agents, and good algorithm convergence.
出处 《南京邮电大学学报(自然科学版)》 EI 2006年第3期52-57,共6页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(60173037和70271050) 国家高技术研究发展计划(863计划)(2002AA776032) 江苏省自然科学基金(BK2003105) 江苏省计算机信息处理技术重点实验室基金(kjs03061) 江苏省教育厅自然科学研究专项基金(02SJD520002)资助项目
关键词 移动自组织网络 入侵检测系统 移动代理 部署算法 网络仿真 MANET Intrusion detection system Mobile agent Disposal algorithm Network simulator
  • 相关文献

参考文献8

  • 1王海涛,郑少仁.移动Ad hoc网络中的安全问题[J].中国数据通信,2002,4(8):65-68. 被引量:2
  • 2张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003.. 被引量:133
  • 3PUTTINI R, PERCHER J M, ME L, et al. A Fully Distributed IDS for MANET[ C]//ISCC 2004. 2004. 被引量:1
  • 4王梅,李娜.入侵检测技术在移动Ad Hoc网络中的应用[J].电子技术(上海),2004,31(8):4-7. 被引量:2
  • 5KACHIRSKI O, GUHA R. Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks [ C ]//IEEE Workshop on Knowledge Media Networking. July 2002. 被引量:1
  • 6DEITELHM DEITELPJ 周靖 黄都培译.C+ +编程经典[M].北京:清华大学出版社,2002.. 被引量:2
  • 7徐雷鸣等编著..NS与网络模拟[M].北京:科学技术文献出版社,2003:195.
  • 8王金龙等编著..Ad Hoc移动无线网络[M].北京:国防工业出版社,2004:326.

二级参考文献13

  • 1Yongguang Zhang,Wenke Lee.Intrusion Detection in Wireless Ad Hoc Networks.In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking(MobiCom'2000),August 6-11,2000,Boston, Massachussetts 被引量:1
  • 2Staniford-Chen S,Cheung S,Crawford R,et al..GrIDS: a Graph Based Intrusion Detection System for Large Networks. In: National Institute of Standards and Technology. Proceedings of the 19th National Information Security Conference, Oct 1996,(1): 361-370 被引量:1
  • 3Macker J.Corson S.Mobile Ad Hoc Networks (MANET).Ht tp://www.ietf.org/html. charter/manet-charter.html,1997 被引量:1
  • 4Wood M,Erlinger M. Intrusion Detection Message Exchange Requirements. Internet-Draft,draft-ietf-idwg- requirements-06,2001 被引量:1
  • 5Jiejun Kong, Haiyun Luo, Kaixin Xu,et al. Adaptive Security for Multi-layer Ad Hoc Networks.http:// www.cs.ucla.edu/wing/pdfdocs/WCMC02.pdf 被引量:1
  • 6B.Lu,U. W. Pooch. Cooperative Security-Enforcement in Mobile Ad Hoc Networks. MWCN 2002 Conference Program,Session 8: Mobile and Wireless Security 被引量:1
  • 7Jean-Pierre Hubaux,Levente Buttyan,Srdan Capkun.The Quest for Security in Mobile Ad Hoc Networks. Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing. MobiHOC,2001 被引量:1
  • 8Lunt T F,Jagannathan R,Lee R,et al..IDES: The Enhanced Prototype--a Real-Time Intrusion Detection Expert System. Technical Report SRI-CSl-88-12, CASRI International,1988 被引量:1
  • 9Teresa F Lunt,Debra Anderson. Software Requirements Specification: Next Generation Intrusion Detection Expert System. Final Report A001,CA: SRI International,1994 被引量:1
  • 10Porras P A,Valdes A.Live Traffic Analysis of TCP/IP Gateways. In:Proc of ISOC Symp on Network and Distributed System Security(NDSS'98),San Diego,CA,March 1998 被引量:1

共引文献135

同被引文献5

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部