期刊文献+

基于移动agent的无线自组网络主动防护模型 被引量:1

Active Protecting Model in Ad Hoc Networks Using Mobile Agent
下载PDF
导出
摘要 提出一种主动实时防护模型,每个节点上的监视agent收集其周围邻居节点的行为信息,并向每个区域内的决策agent汇报,决策agent进行判断,发现入侵者后,产生阻击agent在入侵者周围形成一道移动防火墙,将入侵者包围并隔离于网络,消除入侵行为.该模型通过多种功能的移动agent组成一个有机整体来实现主动入侵响应.实验结果表明,本模型能够有效地阻止入侵行为. The nature of ad hoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks and there is no automated, network-wide counteraction against detected intrusions. This paper proposed an architecture of cooperation intrusion response based multi-agent. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes, and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form a mobile firewall to isolate the intruder. In the end, the model was evaluated by simulation and test bed.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2009年第6期879-884,889,共7页 Journal of Shanghai Jiaotong University
基金 国家高技术研究发展计划(863)资助项目(2006AA01Z436 2007AA01Z452 2009AA01Z118) 国家大学生创新性实验计划资助项目(IAP1028 IAP2023) 上海交通大学PRP资助项目(T03613005)
关键词 计算机网络 安全 移动AGENT 无线自组网络 入侵检测 computer networks security mobile agent mobile ad hoc networks intrusion detection
  • 相关文献

参考文献11

  • 1RFC 2501, Mobile ad hoe networking (MANET): Routing protocol performance issues and evaluation considerations [S]. 被引量:1
  • 2易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 3Yi P, Zou F T, Li J H. Real-time protocol analysis for detecting routing attacks in wireless mesh networks[J]. Journal of Computational Information Systems, 2007,3(6): 2219-2228. 被引量:1
  • 4Jun L, Hubaux J P, Eugster P T, et al. Dictate: Distributed certification authority with probabilistic freshness for ad hoc networks[J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2 (4): 311-323. 被引量:1
  • 5Yi Ping,Hou Yafei,Zhong Yiping,Zhang Shiyong,Dai Zhoulin.Flooding attack and defence in Ad hoc networks[J].Journal of Systems Engineering and Electronics,2006,17(2):410-416. 被引量:5
  • 6Xia Z Y, Wang I, DIMH.. A novel model to detect and isolate malicious hosts for mobile ad hoc network [J]. Computer Standards & Interfaces, 2006, 58(6): 660-669. 被引量:1
  • 7Hasswa A, Zulkernine M, Hassanein H. Routeguard: An intrusion detection and response system for mobile ad hoe networks[C]//Proceedings of the IEEE International Conference on Wireless and Mobile Computing. Networking and Communications, Montreal, Canada: IEEE, 2005: 336-343. 被引量:1
  • 8Chen HS, Ji Z Z, Hu M Z, etal. Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol [J]. Journal of Network and Computer Applications, 2007, 30(1): 145-166. 被引量:1
  • 9Jahnke M, Tolle J, Lettgen S, et al. A robust SNMP based infrastructure for intrusion detection and response in tactical MANETs [C]//Proceedings of Detection of Intrusions and Malware & Vulnerability Assessment, Third International Conference. Berlin, Germany: IEEE Press, 2006: 164-180. 被引量:1
  • 10Jiang Yi-chuan, Jiang Jiu-chuan, Ishida T. Compatibility between the local and social performances of multi-agent societies[J]. Expert Systems with Applications, 2009, 36 (3) : 4443-4450. 被引量:1

二级参考文献49

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353. 被引量:1
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273. 被引量:1
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283. 被引量:1
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158. 被引量:1
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003. 被引量:1
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005. 被引量:1
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002. 被引量:1
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96. 被引量:1
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592. 被引量:1

共引文献64

同被引文献11

  • 1Akyildiz I F, Wang X. Wireless mesh networks: A survey [J]. Computer Networks, 2005,47 (4) : 445- 487. 被引量:1
  • 2YI Ping, ZHONG Yi-ping, ZHANG Shi-yong, eta Flooding attack and defence in ad hoc networks [J].Journal of Systems Engineering and Electronics, 200 17(2) :410-416. 被引量:1
  • 3Forrest S, Hofmeyr S, Somayaji A. Computer immunology[J]. Communications of the ACM, 1997, 40(10) : 88-96. 被引量:1
  • 4Boukerche, Machado B, Regina L, et al. An agent based and biological inspired real-time intrusion detection and security model for computer network operations [J]. Computer Communications, 2007, 30 (13) : 2649-2660. 被引量:1
  • 5Lebbe A, Agbinya I, Chaczko Z, et al. Artificial immune system inspired danger modeling in wireless mesh networks [C]//Proceedings of the International Conference on Computer and Communication Engineering. Malaysia: IEEE Press, 2008: 984-988. 被引量:1
  • 6Dasgupta D. Advances in artificial immune systems [J].IEEE Computational Intelligence Magazine, 2006,1(4) : 40-49. 被引量:1
  • 7Lau H Y K, Wong V W K. An immunity-based distributed multiagent-control framework [J]. IEEE Transactions on Systems, Man and Cybernetics, Part A, 2006,36(1):91-108. 被引量:1
  • 8Somayaji S, Hofmeyr, Forrest S. Principles of a computer immune system [C]//New Security Paradigms Workshop. New York, USA: ACM, 1998 : 75- 82. 被引量:1
  • 9JIANG Yi-ehuan, JIANG Jiu-chuan, Ishida T. Compatibility between the local and social performances of multi-agent societies [J]. Expert Systems with Applications, 2009, 36(3)..4443-4450. 被引量:1
  • 10JIANG Yi-chuan, JIANG Jiu-chuan. A multi-agent coordination model for the variation of underlying network topology [J]. Expert Systems with Applications, 2005,29 (2) : 372-382. 被引量:1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部