메뉴 건너뛰기




Volumn , Issue , 2006, Pages 51-60

Visualization assisted detection of sybil attacks in wireless networks

Author keywords

Interactive detection; Sybil attacks; Topology visualization; Visualization on network security; Wireless networks

Indexed keywords

INTERACTIVE DETECTION; SYBIL ATTACKS; TOPOLOGY VISUALIZATION; VISUALIZATION ON NETWORK SECURITY;

EID: 34547298203     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179576.1179585     Document Type: Conference Paper
Times cited : (10)

References (36)
  • 1
    • 85081442222 scopus 로고    scopus 로고
    • Proceedings of IEC Workshop on Internet Simulations with the NS simulator
    • Proceedings of IEC Workshop on Internet Simulations with the NS simulator, 2000.
    • (2000)
  • 2
    • 33749520207 scopus 로고    scopus 로고
    • K. Abdullah, C. Lee, G. Conti, J. Copeland, and J. Stasko. IDS RainStorm: Visualizing IDS Alarms. In Proc. of VizSEC, 2005.
    • K. Abdullah, C. Lee, G. Conti, J. Copeland, and J. Stasko. IDS RainStorm: Visualizing IDS Alarms. In Proc. of VizSEC, 2005.
  • 3
    • 84977830295 scopus 로고    scopus 로고
    • Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols
    • F. Anjum, D. Subhadrabandhu, and S. Sarkar. Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols. In Proc. of VTC, 2003.
    • (2003) Proc. of VTC
    • Anjum, F.1    Subhadrabandhu, D.2    Sarkar, S.3
  • 6
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • V. Bhuse and A. Gupta. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, 1(15), 2006.
    • (2006) Journal of High Speed Networks , vol.1 , Issue.15
    • Bhuse, V.1    Gupta, A.2
  • 7
    • 25644450392 scopus 로고    scopus 로고
    • Perfect Simulation and Stationarity of a Class of Mobility Models
    • J.-Y. Le Boudec and M. Vojnovic. Perfect Simulation and Stationarity of a Class of Mobility Models. In Proc. of IEEE Infocom, 2005.
    • (2005) Proc. of IEEE Infocom
    • Le Boudec, J.-Y.1    Vojnovic, M.2
  • 12
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key pre-distribution scheme for wireless sensor networks
    • W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proc. of ACM CCS, pages 42-51, 2003.
    • (2003) Proc. of ACM CCS , pp. 42-51
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 13
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of ACM CCS, pages 41-47, 2002.
    • (2002) Proceedings of ACM CCS , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 15
    • 34247147101 scopus 로고    scopus 로고
    • Visual Correlation of Host Processes and Traffic
    • G. Fink, P. Muessig, and C. North. Visual Correlation of Host Processes and Traffic. In Proc. of VizSEC, 2005.
    • (2005) Proc. of VizSEC
    • Fink, G.1    Muessig, P.2    North, C.3
  • 24
    • 84866469313 scopus 로고    scopus 로고
    • L. Lazos and R. Poovendran. SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73-100, 2005.
    • L. Lazos and R. Poovendran. SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sen. Netw., 1(1):73-100, 2005.
  • 27
    • 17744389982 scopus 로고    scopus 로고
    • Multi-hop cellular networks: Architecture and protocols for best-effort and real-time communication
    • B. S. Manoj, R. Ananthapadmanabha, and C. Siva Ram Murthy. Multi-hop cellular networks: architecture and protocols for best-effort and real-time communication. J. Parallel Distrib. Comput., 65(6):767-791, 2005.
    • (2005) J. Parallel Distrib. Comput , vol.65 , Issue.6 , pp. 767-791
    • Manoj, B.S.1    Ananthapadmanabha, R.2    Siva Ram Murthy, C.3
  • 29
    • 33749513452 scopus 로고    scopus 로고
    • A Visualization Methodology for Characterization of Network Scans
    • C. Muelder, K. Ma, and T. Bartoletti. A Visualization Methodology for Characterization of Network Scans. In Proc. of VizSEC, 2005.
    • (2005) Proc. of VizSEC
    • Muelder, C.1    Ma, K.2    Bartoletti, T.3
  • 31
    • 33749445428 scopus 로고    scopus 로고
    • Effectively Visualizing Large Networks Through Sampling
    • D. Rafiei and S. Curial. Effectively Visualizing Large Networks Through Sampling. In Proc. of IEEE Visualization, 2005.
    • (2005) Proc. of IEEE Visualization
    • Rafiei, D.1    Curial, S.2
  • 32
    • 33749519234 scopus 로고    scopus 로고
    • ID Graphs: Intrusion Detection and Analysis Using Histographs
    • P. Ren, Y. Gao, Z. Li, Y. Chen, and B. Watson. ID Graphs: Intrusion Detection and Analysis Using Histographs. In Proc. of VizSEC, 2005.
    • (2005) Proc. of VizSEC
    • Ren, P.1    Gao, Y.2    Li, Z.3    Chen, Y.4    Watson, B.5
  • 36
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proc. of ACM MobiCom, pages 275-283, 2000.
    • (2000) Proc. of ACM MobiCom , pp. 275-283
    • Zhang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.