期刊文献+

Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6

Multi-agent cooperative intrusion response in mobile adhoc networks
在线阅读 下载PDF
导出
摘要 The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页 系统工程与电子技术(英文版)
基金 This project was supported by the National Natural Science Foundation of China (60672068) the National High Technology Development 863 Program of China (2006AA01Z436, 2007AA01Z452.)
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response computer networks security mobile agent mobile adhoc networks intrusion detection intrusion response
  • 相关文献

参考文献3

二级参考文献49

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2Z J Haas,Parlman.The performance of query control schemes for zone routing protocol [J]. ACM/Trans. Net,2001,9(4) :427 - 438.
  • 3D B Johnson, D A Maltz. Dynamic Source Routing in Ad-Hoc Wireless Networks [M]. Mobile Comp. 1996.153 - 81.
  • 4F Stajano, R Andersson. The resurrecting duckling: Security issues in Ad-hoc wireless networks [ A]. Security Protocols, 7^th International Workshop Proceedings [ C]. LNCS Springer-Verlag, 1999.102 - 105.
  • 5R Gennaro, et al. Robust threshold DSS signatures [ A ]. Advances in Cryptography, Proc. Eurocrypt' 96 [ C ]. Springer-Verlag, 1996.
  • 6Y Frakel, et al. Proactive RSA [ A ]. Advances in Cryptography, Proc.crypt'97 [C]. Springer-Verlag, 1997.440 - 454.
  • 7Lamport, et al. The byzatine generals problem [ J J. ACM Trans On Programming languages and Systems, 1982,4:382 -401.
  • 8Y Desmedt, S Jajodia. Redistributing Secret Shares in New Access Structures and Its Application [ R]. George Masion University, 1997.
  • 9RFC1321 .The MD5 Message Digest Algorithm .
  • 10Lidong Zhou, Zygmunt J Hass. Securing Ad Hoc networks [ J ]. IEEE Network, 1999:24 - 29.

共引文献107

同被引文献60

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2易平,蒋嶷川,钟亦平,张世永.移动Ad hoc网络路由协议安全研究[J].计算机科学,2005,32(6):37-40. 被引量:6
  • 3Zhang Y G,Lee W.Intrusion detection techniques for mobile MANET[J].Wireless Networks Journal,2003,9(5):545-556.
  • 4Huang Y A,Lee W K.A cooperative intrusion detection system for ad hoc networks[C] ∥Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks.2003:35-147.
  • 5Sen S,John A C.A grammatical evolution approach to intrusion detection on mobile ad hoc networks[C] ∥Proceedings of the Second ACM Conference on Wireless Network Security.2009:95-102.
  • 6Liu Y,Li Y,Man H,et al.A hybrid data mining anomaly detection technique in ad hoc networks[J].International Journal of Wireless and Mobile Computing,2007,2(10):37-46.
  • 7Wang C H,Chin S.Reputation based intrusion detection system with threshold cryptography for wireless mobile ad hoc networks[C] ∥The 2008 International Computer Symposium(ICS 2008).2008:503-509.
  • 8Ramachandran C,Misra S,Obaidat M S.FORK:a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks[J].Computer Communications,2008:31(16):3855-3869.
  • 9Zhou B,Shi Q,Merabti M.Balancing intrusion detection re-sources in ubiquitous computing networks[J].Computer Communications,2008,31(15):3643-3653.
  • 10Vigna G,Gwalani S,Srinivasan K,et al.An intrusion detection tool for AODV-based ad hoc wireless networks[C] ∥Procee-dings of the 20th Annual Computer Security Applications Confe-rence.2004:16-27.

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部