期刊文献+

一种新的移动ad-hoc网络异常入侵检测技术 被引量:3

A new anomaly detection technology in mobile ad-hoc networks
在线阅读 下载PDF
导出
摘要 随着无线网络的发展和移动计算应用的快速增加,网络安全问题更加突出。入侵检测已经从保护固定有线网络扩展到移动无线网络。入侵检测方法有两种:异常检测和误用检测。作为构成无线移动网络两种方式之一的移动ad-hoc网络,由于其与有线网络存在很大差别,现有针对有线网络开发的入侵检测系统很难适用于ad-hoc网络,面临着网络中各种方式的入侵。提出了入侵检测技术在移动ad-hoc网络面临的挑战,并提出了基于移动ad-hoc网络的异常入侵检测系统。 With the rapid increasing of wireless network and mobile computing, the network's safety becomes more important. As wireless mobile networks, mobile ad-hoc networks creates new vulnerabilities that do not exist in a fixed wired network, and is susceptible to attacks. In this paper, we proposed intrusion detection and the challenges of mobile ad-hoc networks, and have developed an anomaly detection system in mobile ad-hoc networks.
出处 《浙江工业大学学报》 CAS 2004年第6期696-699,共4页 Journal of Zhejiang University of Technology
基金 浙江省自然科学基金项目(600038)
  • 相关文献

参考文献5

  • 1Denning D E . An intrusion-detection model[J]. IEEE Trans on Software Engineering, 1987,13(2):222-254.
  • 2Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks[A]. Proc of the 6th International Conference on Mobile Computing and Networking (MobiCom 2000)[C]. Berlin:Springer,2000. 275-283.
  • 3Krugel C, Toth T. Distributed pattern detection for intrusion detection[A]. ISOC Symp on Network and Distributed System Security (NDSS 2002)[C]. Washington: Addison-Wesley,2002. 111-118.
  • 4Venktraman L. Secured routing protocol for ad-hoc networks[A]. Master's Thesis[C]. University of Cincinnati, Houston:Thames & Hudson, 2000.
  • 5Jacobs S, Glass S, Hiller T. Mobile IP authenti-cation, authorization, and accounting requirement[A]. Request for Comments 2977[C]. MA:Internet Engineering Task Force, 2000.

同被引文献40

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部