메뉴 건너뛰기




Volumn , Issue , 2004, Pages 16-27

An intrusion detection tool for AODV-based ad hoc wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC WIRELESS NETWORKS; MOBILE AD HOC NETWORK (MANET); ROUTING PROTOCOLS; WIRED NETWORKS;

EID: 21644441634     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (99)

References (24)
  • 2
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington DC, August
    • J. Bellardo and J. Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proceedings of the USENIX Security Symposium, pages 15-28, Washington DC, August 2003.
    • (2003) Proceedings of the USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, J.2
  • 5
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi. Towards a taxonomy of intrusion-detection systems. Computer Networks, 31(8):805-822, 1999.
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 11
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1X Protocol
    • Department of Computer Science, University of Maryland, February
    • A. Mishra and W. Arbaugh. An Initial Security Analysis of the IEEE 802. 1X Protocol. Technical Report, Department of Computer Science, University of Maryland, February 2002.
    • (2002) Technical Report
    • Mishra, A.1    Arbaugh, W.2
  • 14
    • 84860956980 scopus 로고    scopus 로고
    • libnet
    • M. Schiffman. libnet. http://packetfactory.net/libnet/, 2002.
    • (2002)
    • Schiffman, M.1
  • 20
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May/June
    • H. Yih-Chun and A.Perrig. A survey of secure wireless ad hoc routing. IEEE Security & Privacy Magazine, 2(3):28-39, May/June 2004.
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Yih-Chun, H.1    Perrig, A.2
  • 24
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.