期刊文献+

基于簇和代理的Ad Hoc网络分布式入侵检测模型

Distributed Intrusion Detection Model of the Ad Hoc Networks Based on Cluster and Agent
下载PDF
导出
摘要 基于簇技术,针对由于Ad Hoc网络的独特网络特性而致使其安全性特别脆弱的现状,提出一种新的Ad Hoc网络分布式代理入侵检测模型。此模型有效地解决了以往入侵检测审计数据的不准确、不及时、不可靠等弱点,同时很好地提高了Ad hoc网络的安全性和对分布式攻击的协同检测能力。该模型具有较好的扩展性、灵活性和准确性,比较适合带宽和资源有限的Ad Hoc网络。 Based on cluster technology, due to the Ad Hoc networks based on the special characteristics of the network security particularly vulnerable situation, this paper proposes a new kind of muhilayer distributed intrusion detection model based on agent in Ad Hoc NetWork.This model effectively solves that the audit data of intrusion detection system is accuracy, timeliness, no reliability, of no such weaknesses and so on, meanwhile it improved the safety of Ad hoe networks and distributed attacks capabilities on the synergy detection very well. This model has good flexibility and expansibility, accuracy, and is suitable for the Ad Hoc network whose resources and bandwidth is limited.
出处 《电脑编程技巧与维护》 2009年第16期109-111,共3页 Computer Programming Skills & Maintenance
关键词 簇技术 AD HOC网络 代理 入侵检测模型 cluster technology Ad Hoc networks agent intrusion detection model
  • 相关文献

参考文献3

二级参考文献44

  • 1易平,钟亦平,张世永.移动adhoc网络中DOS攻击及其防御机制[J].计算机研究与发展,2005,42(4):697-704. 被引量:15
  • 2Zhang Y, Lee W, Huang Y A. Security in ad hoc network: a general intrusion detection architecture enhancing trust based approaches[J]. Mobile Networks and Applications, 2001, 1(16): 1-16.
  • 3Hong X, Gerla M, Pei G, Chiang C C. A group mobility model for ad hoc wireless networks[C]. Proceedings of ACM/IEEE MSWiM'99, Seattle, WA, Augst 1999, 53-60.
  • 4Asokan N, Ginzboorg P. Key agreement in ad hoc networks[J]. Computer Communications, 2000, 23: 1627-1637.
  • 5Hauser R, Przygienda T, Trudik G. Lowing security overhead in link state routing [J]. Computer Networks, 1999, 31: 885-894.
  • 6Lee W, Park C T, Stolfo S J. Automated intrusion detection using NFR: methods and experiences[C]. Proceedings of the workshop on intrusion detection and network monitoring, Santa Clara, California, USA, April 1999, 9-12.
  • 7Lippmann R, Haines J W, Fried D J, Korba J, Das K. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks-the International Journal of Computer and Telecommunications Networking, 2000, 34(4): 579-595.
  • 8Hubaux J P, Buttyan L, Capkun S. The quest for security in mobile ad hoc networks[C]. Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001.
  • 9Zhou L, Haas Z J. Securing ad hoc networks[J]. IEEE Networks, 1999, 13(6):24-30.
  • 10Lee W, Xiang D. Information-theoretic measures for anomaly detection[C]. 2001 IEEE Symp. on Security and Privacy, Oakland, CA, May 2000.

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部