期刊文献+

Ad hoc网络中一种基于学习Petri网的入侵检测模型

AN INTRUSION DETECTION MODEL BASED ON LEARNING PETRI NETWORK IN AD HOC NETWORKS
下载PDF
导出
摘要 移动自组织网络是由无线移动节点组成的复杂分布式通信系统。研究了移动自组织网络的入侵检测问题,对当前Ad hoc网络上的入侵行为和入侵检测技术进行了分析,论述了学习Petri网络应用于入侵检测系统中的优势,给出了一个基于学习Petri网络的入侵检测实施模型,并在网络仿真软件ns2中对其进行了评估。 Mobile Ad hoe networks represent complex distributed communication systems comprised of wireless mobile nodes. Based on the discussion of intrusion detection problem in Ad hoc networks, in this paper it analyses the intrusion behaviour and some intrusion detection technology, discusses the advantage on the application of learning Petri network in intrusion detection and presents an implementing model of intrusion detection based on learning Petri network and evaluates it in network simulation software ns-2.
作者 刘志远
出处 《计算机应用与软件》 CSCD 北大核心 2008年第8期17-18,67,共3页 Computer Applications and Software
基金 国家自然科学基金(6043027)
关键词 移动自组网 异常入侵检测 学习 PETRI网 Mobile Ad hoc networks Anomaly intrusion detection Learning Petri networks
  • 相关文献

参考文献5

二级参考文献26

  • 1刘有才,模糊专家系统原理与设计,1995年 被引量:1
  • 2刘春林,东南大学学报,29卷,1期 被引量:1
  • 3Brutch P,Ko C.Challenges in Intrusion Detection for Wireless Ad-hoc Networks.In:2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops),2003. 被引量:1
  • 4Kachirski O,Guha R.Effective Intrusion Detection Using Multi ple Sensors in Wireless Ad Hoc Networks.In:Proc.of the 36th Hawaii Intl.Conf.on System Sciences IEEE (HICSS'03),2002. 被引量:1
  • 5Hu Y C ,Johnson D ,Perrig A.SEAD:Secure efficient distance vector routing for mobile wireless ad hoc networks.In:Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02),2002.3-13. 被引量:1
  • 6Sun B,Wu K,Pooch W,et al.Alert Aggregation in Mobile Ad Hoc Networks.In:WiSE'03.San Diego,California,2003. 被引量:1
  • 7Huang Yi-an,Lee W.A Cooperative Intrusion Detection System for Ad Hoc Networks.In:2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03),2003. 被引量:1
  • 8Albers P ,Camp O ,Percher J-M ,et al.Security in Ad Hoc Networks:a General Intrusion Detection Architecture Enhancing Trust Based Approaches.In:The 1st Intl.Workshop on Wire- less Information Systems,Proc.of the 4th International Conf.onEnterprise Information Systems,2002. 被引量:1
  • 9Buttyan L,Hubaux J P.Report on a Working Session on Security in Wireless Ad Hoc Networks Mobile Computing and Communications Review,2002,6(4). 被引量:1
  • 10Anjum F,Subhadrabandhu D,Sarkar S.Signature based Intrusion Detection for Wireless Ad-Hoc Networks:A Comparative study of various routing protocols.In:Proc.of Vehicular Technology Conference,Wireless Security Symposium,Orlando,Florida,Oct.2003. 被引量:1

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部