期刊文献+

移动Ad Hoc网络的入侵响应研究

Intrusion detection and response in mobile Ad Hoc network
在线阅读 下载PDF
导出
摘要 传统网络中的入侵阻止和检测等防护方法在网络结构脆弱、节点移动的移动自组网络中无法达到预期效果。将移动代理引入无线自组网络中,设计分布式入侵检测响应系统,通过多种功能的移动代理实现入侵检测功能,并在入侵检测的基础上利用移动代理跟踪、隔离入侵节点,对入侵节点做出及时响应。实验结果表明此方法节省网络节点资源、避免网络的崩溃且达到主动响应隔离入侵节点的效果,有效地检测并阻止了入侵行为。 Many traditional security technologies such as intrusion prevention and intrusion detection are subject to restrictions in the network environment of mobile ad hoc networks can not achieve the desired results. This paper introduces mobile agents in wireless ad hoc network security model, designs a distributed intrusion detection and respond system. Through a variety of functions of mobile agent the system implements the functions ofintrusion detection intrusion, and uses mobile agents to track, isolate invasion node to make a timely response. Experimental results show that this method can save the resources of node and avoid the collapse of the network, effective in detecting and preventing intrusions.
作者 赵跃华 张崇
出处 《计算机工程与应用》 CSCD 2012年第7期109-111,164,共4页 Computer Engineering and Applications
关键词 无线移动自组网络 安全 入侵检测 移动代理 mobile Ad Hoc network security intrusion detection mobile agent
  • 相关文献

参考文献8

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Kachirski O,Guha R.Intrusion detection using mobile agents in wireless ad hoc networks[C]//IEEE Workshop on Knowledge Media Networking, KMN ' 02, Kyoto, Japan, 2002.
  • 3Bhargava S,Agraval D P.Security enhancement in AODV protocol for wireless ad hoc networks[C]//Vehicular Technology Conference, Atlantic City,NY, October 2001.
  • 4Brutch P, Ko C.Challenges in intrusion detection for wireless ad-hoc networks[C]//Applieations and the Intemet Workshops, 2003,7(9) : 368-373.
  • 5Zhang Yongguang, Lee Wenke.Intrusion detection in wireless ad hoc networks[C]//The 6th International Conference on Mobile Computing and Networking, MobiCom 2000, Boston, MA, 2000: 275-283.
  • 6Yi Ping,Hou Yafei,Zhong Yiping,Zhang Shiyong,Dai Zhoulin.Flooding attack and defence in Ad hoc networks[J].Journal of Systems Engineering and Electronics,2006,17(2):410-416. 被引量:5
  • 7Jiang Yichuan, Jiang Jiuehuan, Ishida T.Compatibility between the local and social performances of multi-agent soeieties[J].Expert Systems with Applications, 2009,36 (3) : 4443-4450.
  • 8Virtanen S E, Nikander ELocal clustering for hierarchical ad hoc networks[C]//Proc of the Wiopt2004:Modeling and Optimization in Mobile Ad Hoc and Wireless Networks.California: IEEE Computer Society Press,2004:404-405.

二级参考文献49

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2P Dasgupta,S Gokhale.Distributed authentication for Peer to Peer networks[A].IEEE Workshop on Security and Assurance in Ad hoc Networks[C].Orlando,FL,January 28,2003.347-353.
  • 3Lakshmi Venkatraman,Dharma P Agrawal.A novel authentication scheme for Ad hoc networks[A].Wireless Communications and Networking Confernce (WCNC 2000)[C].Chicago,2000.1269-1273.
  • 4Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA,2000.275-283.
  • 5Oleg Kachirski,Ratan Guha.Intrusion detection using mobile agents in wireless Ad Hoc networks[A].IEEE Workshop on Knowledge Media Networking (KMN'02)[C].Kyoto,JAPAN,2002.153-158.
  • 6Chin-Yang Tseng,Poornima Balasubramanyam,et al.A specification-based intrusion Detection system for AODV[A].2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)[C].Fairfax,VA,USA,October 2003.
  • 7Ping Yi,Yiping Zhong,Shiyong Zhang.Real-time protocol analysis for detecting routing attacks in mobile Ad Hoc networks[A].Fifth IEEE International Symposium and School on Advance Distributed Systems (ISSADS2005)[C].Lecture Notes in Computer Science,Guadalajara,Jalisco,México,January 2005.
  • 8P Michiardi,R Molva.Simulation-based analysis of security exposures in mobile ad hoc networks[A].Proc of European wireless conference[C].Firenze,Italy,2002.
  • 9Levente Buttyan,Jean-Pierre Hubaux.Enforcing service availability in mobile Ad-Hoc WANs[A].Proc of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Boston,MA,USA,August 2000.87-96.
  • 10L Buttyán,J -P Hubaux.Stimulating cooperation in self-organizing mobile Ad Hoc networks[J].Mobile Networks and Applications,2003,8(5):579-592.

共引文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部