期刊文献+

分簇体制在MANET入侵检测中的应用

Application of clustering architecture in intrusion detection for MANET
下载PDF
导出
摘要 为了优化MANET的安全性问题,将分簇机制应用到MANET的入侵检测中,设计了相关的分簇算法,通信机制和协同检测机制。实验表明,分簇机制的引入在入侵检测的开销和精确度方面较传统的方法更具优势。 To optimize the security problem of MANET, a cooperative intrusion detection mechanism was proposed based on clustering architecture, The cooperative and communicable measures between clusters were discussed, and then the algorithm for cluster formation was put forward. The analysis of the example indicates that the clustering architecture is superior to the traditional methods in the accuracy and the cost of intrusion detection.
作者 杨帆 彭新光
出处 《计算机应用》 CSCD 北大核心 2007年第4期832-834,共3页 journal of Computer Applications
基金 山西省自然科学基金资助项目(20041047)
关键词 入侵检测 移动自组网 分簇体制 intrusion detection mobile Ad hoc network clustering architecture
  • 相关文献

参考文献8

  • 1赵志峰,郑少仁.Ad hoc网络体系结构研究[J].电信科学,2001,17(1):14-17. 被引量:70
  • 2易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 3BUCHEGGER S,BOUDEC JL.Nodes beating grudges:Towards routing security,fairness,and robustness in mobile Ad hoc networks[A].Proceedings of the Tenth Euromicro Workshop on Parallel,Distributed and Network-based Processing[C].Canary Islands,Spain:IEEE Computer Society,2002.403-410. 被引量:1
  • 4KRISHNA P,VAIDYA NH,CHATTERJEE M,et al.A clusterbased approach for routing in dynamic networks[J].ACM SIGCOMM Computer Communication Review,1997,27(2):49-64,1997. 被引量:1
  • 5TING CHAO HOU,TZU JANE TSAI.An access-based clustering protocol for multihop wireless Ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2001,19(7):1201-1210. 被引量:1
  • 6CHEN G,NOCETTI F,CONZALEZ J.Connectivity based k-hop clustering in wireless networks[A].Proceedings of the 35th Hawaii International Conference on System Sciences[C].Hawaii:IEEE Computer Society,2002. 被引量:1
  • 7HUANG Y,LEE W.A cooperative intrusion detection system for Ad Hoc networks[A].Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03)[C].Fairfax VA,2003. 被引量:1
  • 8KACHIRSKI O,GUHA R.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Networking (KMN'02)[C].Kyoto,Japan,2002.153-158. 被引量:1

二级参考文献35

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353. 被引量:1
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273. 被引量:1
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283. 被引量:1
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158. 被引量:1
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003. 被引量:1
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005. 被引量:1
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002. 被引量:1
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96. 被引量:1
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592. 被引量:1

共引文献131

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部