메뉴 건너뛰기




Volumn 9, Issue 5, 2003, Pages 545-556

Intrusion detection techniques for mobile wireless networks

Author keywords

Anomaly detection; Cooperative detection; Intrusion detection; Intrusion response; Mobile ad hoc networks

Indexed keywords

ALGORITHMS; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER SIMULATION; COMPUTER SYSTEM FIREWALLS; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; MOBILE COMPUTING; NETWORK PROTOCOLS; SECURITY OF DATA; SERVERS;

EID: 0041473688     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1024600519144     Document Type: Article
Times cited : (494)

References (27)
  • 1
    • 26744432427 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • Technical Report 96-3, Portalnd State University, Computer Science
    • J. Binkley, Authenticated ad hoc routing at the link layer for mobile systems, Technical Report 96-3, Portalnd State University, Computer Science (1996).
    • (1996)
    • Binkley, J.1
  • 3
    • 0003597247 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile adhocnetworks
    • Internet Draft, draft-ietf-manet-dsr-01.txt (December)
    • J. Broch, D. Johnson and D. Maltz, The dynamic source routing protocol for mobile adhocnetworks, Internet Draft, draft-ietf-manet-dsr-01.txt (December 1998).
    • (1998)
    • Broch, J.1    Johnson, D.2    Maltz, D.3
  • 8
    • 0003478316 scopus 로고
    • The architecture of a network level intrusion detection system
    • Technical Report, Computer Science Department, University of New Mexico (August)
    • R. Heady, G. Luger, A. Maccabe and M. Servilla, The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico (August 1990).
    • (1990)
    • Heady, R.1    Luger, G.2    Maccabe, A.3    Servilla, M.4
  • 10
    • 0013029399 scopus 로고    scopus 로고
    • MANET authentication architecture
    • Internet Draft, draft-jacobs-imep-auth-arch-01.txt (February); expired at 2000
    • S. Jacobs and M.S. Corson, MANET authentication architecture, Internet Draft, draft-jacobs-imep-auth-arch-01.txt (February 1999) expired at 2000.
    • (1999)
    • Jacobs, S.1    Corson, M.S.2
  • 11
    • 0043220723 scopus 로고    scopus 로고
    • Mobile IP authentication, authorization, and accounting requirements
    • Request for Comments 2977, Internet Engineering Task Force (October)
    • S. Jacobs, S. Glass, T. Hiller and C. Perkins, Mobile IP authentication, authorization, and accounting requirements, Request for Comments 2977, Internet Engineering Task Force (October 2000).
    • (2000)
    • Jacobs, S.1    Glass, S.2    Hiller, T.3    Perkins, C.4
  • 14
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • eds. T. Imielinski and H. Korth (Kluwer Academic, Dordrecht)
    • D.B. Johnson and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in: Mobile Computing, eds. T. Imielinski and H. Korth (Kluwer Academic, Dordrecht, 1996) pp. 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 15
    • 0034266911 scopus 로고    scopus 로고
    • Location-aided routing (LAR) in mobile ad hoc networks
    • extended version of the MobiCom'98 paper
    • Y.-B. Ko and N.H. Vaidya, Location-aided routing (LAR) in mobile ad hoc networks, ACM/Baltzer Wireless Networks (WINET) 6(4) (2000), extended version of the MobiCom'98 paper.
    • (2000) ACM/Baltzer Wireless Networks (WINET) , vol.6 , Issue.4
    • Ko, Y.-B.1    Vaidya, N.H.2
  • 19
    • 0003451777 scopus 로고
    • A real-time intrusion detection expert system (IDES) - Final technical report
    • Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA (February)
    • T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes and T. Garvey, A real-time intrusion detection expert system (IDES) - final technical report, Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA (February 1992).
    • (1992)
    • Lunt, T.1    Tamaru, A.2    Gilham, F.3    Jagannathan, R.4    Neumann, P.5    Javitz, H.6    Valdes, A.7    Garvey, T.8
  • 26
    • 0003902869 scopus 로고    scopus 로고
    • Secured routing protocol for ad-hoc networks
    • Master's Thesis, University of Cincinnati, OH (March)
    • L. Venkatraman, Secured routing protocol for ad-hoc networks, Master's Thesis, University of Cincinnati, OH (March 2000).
    • (2000)
    • Venkatraman, L.1
  • 27
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z.J. Haas, Securing ad hoc networks, IEEE Network 13(6) (1999) 24-30.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.