期刊文献+

Ad Hoc网络入侵检测系统研究

Study on Intrusion Detection System for Ad Hoc Network
下载PDF
导出
摘要 作为一种无中心分布控制网络—Ad Hoc网络,它的安全特性对安全防范提出了更高的要求。入侵检测技术作为安全防范的第二道设施,是AdHoc网络获得高抗毁性的必要手段。本文基于Ad Hoc网络的分簇结构,运用Agent技术设计了一个入侵检测系统。同时,提出采用基于信任的簇划分机制,完成对整个网络簇的划分,进而对系统的不同Agent进行任务分配,节省节点资源。 Ad Hoc networks do not depend on any predefined infrastructure or centralized administration to operate.Their security characters request security preventions more complex.As the second line of defense,intrusion detection is the necessary means of getting the high survivability.Based on clustering structure of Ad Hoc networks,this text designed a intrusion detection system using agent technology.Meanwhile proposed trust-based strategy to finish partition of cluster and task assignment of system's different agent,saving nodes'resource.
出处 《科技广场》 2010年第7期111-113,共3页 Science Mosaic
基金 江西科技师范学院自然科学研究项目(KY2009ZY13)
关键词 入侵检测 AD HOC网络 成簇 Intrusion Detection Ad Hoc Network Clustering Strategy
  • 相关文献

参考文献7

  • 1Zhang Y,Lee W.Intrusion detection in wireless ad-hoc networks[J/OL].http://dependability.cs.virginia.edu/ bibliography/p275-zhang.pdf,2004-10-10. 被引量:1
  • 2Albers P,Camp O,Percher J M,et al.Security in ad-hoc networks:a general intrusion detection architecture enhancing t rust based approach[J/OL].http://www.rennes.supelec.fr/ren/rd/ss ir/publis/wis02_albers_camp_percher_als.pdf,2004-11-03. 被引量:1
  • 3Smith A B.An examination of an intrusion detection architecture for mobile ad hoc networks[J/OL].http://cisse.info/CISSE%20J/2001/Smit.pdf,2004-11-04. 被引量:1
  • 4A.Mishra,K.Nadkami,.A.Patcha.Intrusion detection in wireless ad hoc nerworks[J].IEEE Wireless Communications,vol.11,no.1,pp.48-60,February 2004. 被引量:1
  • 5Hong X,Gerla M,Per G,Chiang C C.A group mobility model for ad hoc wireless networks[C].Proceedings of ACM/IEEE M SW M'99,Seattle,WA,Augst 1999:53-60. 被引量:1
  • 6吴国凤,吴其林.一种基于移动Agent的移动Ad Hoc网络入侵检测系统[J].合肥工业大学学报(自然科学版),2006,29(4):406-410. 被引量:2
  • 7A sokan N,Ginzboorg P.Key agreement in ad hoc networks[J].Computer Communications,2000. 被引量:1

二级参考文献8

  • 1Zhang Y, Lee W, Intrusion detection in wireless ad-hoc networks[J/OL], http://dependability.cs. virginia. edu/bibliography/p275-zhang, pdf, 2004-10-10. 被引量:1
  • 2Marti S. Giuli T, Lai K, et al. Mitigating routing misbehavior in mobile ad hoc networks[J/OL], http://www.hpl.hp. com/personal/Kevin_ Lai/projects/adhoc/mitigating.pdf, 2004-10-20. 被引量:1
  • 3Albers P, Camp O, Percher J M, et al, ,Security in ad hoc networks: a general intrusion detection architecture enhancing trust based approach[J/OL], http://www.rennes.supelec. fr/ren/rd/ssir/publis/wis02_albers_camp_percher_als. pdf, 2004-11-03. 被引量:1
  • 4Smith A B. An examination of an intrusion detection architecture for mobile ad hoc networks[J/OL], http://cisse, info/CISSE%20J/2001/Smit. pdf, 2004-11-04. 被引量:1
  • 5Chan P C, Wei V K. Preemptive distributed intrusion detection using mobile agents[J/OL], bttp://doi, ieeecomputersociety, org/10. 1109/ENABL. 2002. 1029996. 被引量:1
  • 6Rappaport S. Wireless communications; principles and practice[M]. Upper Saddle River, NJ:Prentice Hall, 1995.72-75. 被引量:1
  • 7Bae S H, Lee S J, Su W, et al. The design,implementation and performance evaluation of the on-demand multicast routing protocols in multihop wireless networks[J]. IEEE Network,2000,14(1):70-77. 被引量:1
  • 8Zhou L, Haas Z J. Securing ad hoc networks[J]. IEEE Network Magazine, Special Issue on Network Security, 1999,13(6):24-30. 被引量:1

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部