메뉴 건너뛰기




Volumn 24, Issue 2, 2006, Pages 274-289

A framework for misuse detection in ad hoc networks - Part I

Author keywords

Ad hoc networks; Distributed algorithms; Optimization; Resource management; Site security monitoring

Indexed keywords

AD HOC NETWORKS; INTRUSION DETECTION; RESOURCE MANAGEMENT;

EID: 33144457480     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2005.861387     Document Type: Article
Times cited : (41)

References (29)
  • 1
    • 84858536594 scopus 로고    scopus 로고
    • [Online]
    • [Online]. Available: http://www.esoft.com/products/instagatesoftpaks1.cfm
  • 2
    • 84858536592 scopus 로고    scopus 로고
    • [Online]
    • [Online]. Available:http://www.microsoft.com/technet/security/bulletin/ms00-066.mspx
  • 7
    • 1642309265 scopus 로고    scopus 로고
    • Indianapolis, IN: New Riders, ch. 6
    • E. Cole, Hackers Beware. Indianapolis, IN: New Riders, 2001, ch. 6.
    • (2001) Hackers Beware
    • Cole, E.1
  • 8
    • 0023294428 scopus 로고    scopus 로고
    • An intrusion detection model
    • Feb.
    • D. Denning, "An intrusion detection model," IEEE Trans. Softw. Eng., vol. 13, pp. 222-232, Feb. 2001.
    • (2001) IEEE Trans. Softw. Eng. , vol.13 , pp. 222-232
    • Denning, D.1
  • 12
    • 11244289227 scopus 로고    scopus 로고
    • On k-coverage in a mostly sleeping sensor network
    • Sep.
    • S. Kumar, T. Lai, and J. Balogh, "On k-coverage in a mostly sleeping sensor network," in Proc. ACM MobiCom, Sep. 2004, pp. 144-158.
    • (2004) Proc. ACM MobiCom , pp. 144-158
    • Kumar, S.1    Lai, T.2    Balogh, J.3
  • 13
    • 1542358969 scopus 로고    scopus 로고
    • Ucan: A unified cellular and ad-hoc network architecture
    • Sep.
    • H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu, "Ucan: A unified cellular and ad-hoc network architecture," in Proc. ACM MobiCom, Sep. 2003, pp. 353-367.
    • (2003) Proc. ACM MobiCom , pp. 353-367
    • Luo, H.1    Ramjee, R.2    Sinha, P.3    Li, L.4    Lu, S.5
  • 14
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Aug.
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM MobiCom, Aug. 2000, pp. 255-265.
    • (2000) Proc. ACM MobiCom , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 15
    • 0012127229 scopus 로고    scopus 로고
    • Intrusion and intrusion detection
    • J. McHugh, "Intrusion and intrusion detection," Int. J. Inf. Security, vol. 1, no. 1, pp. 14-35, 2001.
    • (2001) Int. J. Inf. Security , vol.1 , Issue.1 , pp. 14-35
    • McHugh, J.1
  • 16
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Portoroz, Slovenia, Sep.
    • P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. Commun. Multimedia Security Conf., Portoroz, Slovenia, Sep. 2002, pp. 107-121.
    • (2002) Proc. Commun. Multimedia Security Conf. , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 17
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • Jul.
    • D. Wagner, N. Borisov, and I. Goldberg, "Intercepting mobile communications: The insecurity of 802.11," in Proc. ACM MobiCom, Jul. 2001, pp. 180-189.
    • (2001) Proc. ACM MobiCom , pp. 180-189
    • Wagner, D.1    Borisov, N.2    Goldberg, I.3
  • 19
    • 0842331554 scopus 로고    scopus 로고
    • Detecting of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
    • Dec.
    • R. Rao and G. Kesidis, "Detecting of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited," in Proc. IEEE GLOBECOM, Dec. 2003, pp. 2957-2961.
    • (2003) Proc. IEEE GLOBECOM , pp. 2957-2961
    • Rao, R.1    Kesidis, G.2
  • 20
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol: Cooperation of nodes - Fairness in dynamic ad-hoc networks
    • Jun.
    • J. Y. L. Boudec and S. Buchegger, "Performance analysis of the confidant protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks," in Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput., Jun. 2002, pp. 226-236.
    • (2002) Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput. , pp. 226-236
    • Boudec, J.Y.L.1    Buchegger, S.2
  • 21
    • 0041939724 scopus 로고    scopus 로고
    • Unreliable sensor grids: Coverage, connectivity and diameter
    • Apr.
    • S. Shakkottai, R. Srikant, and N. Shroff, "Unreliable sensor grids: Coverage, connectivity and diameter," in Proc. IEEE INFOCOM, vol. 2, Apr. 2003, pp. 1073-1083.
    • (2003) Proc. IEEE INFOCOM , vol.2 , pp. 1073-1083
    • Shakkottai, S.1    Srikant, R.2    Shroff, N.3
  • 22
    • 0004231341 scopus 로고
    • Philadelphia, PA: Society for Industrial and Applied Mathematics
    • H. Solomon, Geometric Probability. Philadelphia, PA: Society for Industrial and Applied Mathematics, 1978.
    • (1978) Geometric Probability
    • Solomon, H.1
  • 25
    • 20344385478 scopus 로고    scopus 로고
    • Efficacy of misuse detection in ad hoc networks
    • Univ. Pennsylvania, Philadelphia, PA, Jun.
    • D. Subhadrabandhu, S. Sarkar, and F. Anjum, "Efficacy of misuse detection in ad hoc networks," Univ. Pennsylvania, Philadelphia, PA, Tech. Rep., Jun. 2004.
    • (2004) Tech. Rep.
    • Subhadrabandhu, D.1    Sarkar, S.2    Anjum, F.3
  • 27
    • 84963002204 scopus 로고
    • On the least number of unit circles which can cover a square
    • S. Verblunsky, "On the least number of unit circles which can cover a square," J. London Math. Soc., vol. 24, pp. 164-170, 1949.
    • (1949) J. London Math. Soc. , vol.24 , pp. 164-170
    • Verblunsky, S.1
  • 28
    • 4444255460 scopus 로고    scopus 로고
    • On deriving the upper bound of alpha-lifetime for large sensor networks
    • May
    • H. Zhang and J. Hou, "On deriving the upper bound of alpha-lifetime for large sensor networks," in Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput., May 2004, pp. 121-132.
    • (2004) Proc. IEEE/ACM Symp. Mobile Ad Hoc Netw. Comput. , pp. 121-132
    • Zhang, H.1    Hou, J.2
  • 29
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Aug.
    • Y. Zhang and W. Lee, "Intrusion detection in wireless ad-hoc networks," in Proc. ACM MobiCom, Aug. 2000, pp. 275-283.
    • (2000) Proc. ACM MobiCom , pp. 275-283
    • Zhang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.