메뉴 건너뛰기




Volumn 4637 LNCS, Issue , 2007, Pages 127-145

Cost-sensitive intrusion responses for mobile ad hoc networks

Author keywords

Adaptive isolation; Attack damage; Attack Damage Index (ADI); MANET; Response Agent (RA); Response cost; Topology Dependency Index (TDI)

Indexed keywords

AD HOC NETWORKS; ADAPTIVE SYSTEMS; CRYPTOGRAPHY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS;

EID: 38149125428     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74320-0_7     Document Type: Conference Paper
Times cited : (27)

References (29)
  • 4
    • 33750370441 scopus 로고    scopus 로고
    • Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model For MANET. In: Zamboni, D., Kruegel, C (eds.) RAID 2006. LNCS, 4219, Springer, Heidelberg (2006)
    • Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model For MANET. In: Zamboni, D., Kruegel, C (eds.) RAID 2006. LNCS, vol. 4219, Springer, Heidelberg (2006)
  • 5
    • 33745657261 scopus 로고    scopus 로고
    • Tseng, CH., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.: A Specification-based Intrusion Detection Model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, Springer, Heidelberg (2006)
    • Tseng, CH., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.: A Specification-based Intrusion Detection Model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, Springer, Heidelberg (2006)
  • 7
    • 84903836776 scopus 로고    scopus 로고
    • How to Misuse AODV: A Case Study of Insider Attacks against Mobile Adhoc Routing Protocols
    • West Point, June, IEEE Computer Society Press, Los Alamitos
    • Ning, P., Sun, K.: How to Misuse AODV: A Case Study of Insider Attacks against Mobile Adhoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003, pp. 60-67. IEEE Computer Society Press, Los Alamitos (2003)
    • (2003) Proceedings of the 4th Annual IEEE Information Assurance Workshop , pp. 60-67
    • Ning, P.1    Sun, K.2
  • 12
    • 34748875337 scopus 로고    scopus 로고
    • DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection Model for MANET
    • Tseng, C.H., Wang, S.-H., Levitt, K.: DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection Model for MANET. In: ASIACCS 2007 (2007)
    • (2007) ASIACCS
    • Tseng, C.H.1    Wang, S.-H.2    Levitt, K.3
  • 13
    • 33750344908 scopus 로고    scopus 로고
    • Security-aware routing protocol for wireless ad hoc networks
    • October
    • Yi, S., Naldurg, P., Kravets, R.: Security-aware routing protocol for wireless ad hoc networks. In: Proceeding of ACM MobiHoc 2001 (October 2001)
    • (2001) Proceeding of ACM MobiHoc
    • Yi, S.1    Naldurg, P.2    Kravets, R.3
  • 14
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24-30 (1999)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 16
    • 35248836533 scopus 로고    scopus 로고
    • Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using Specification-Based Intrusion Detection for Automated Response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, Springer, Heidelberg (2003)
    • Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using Specification-Based Intrusion Detection for Automated Response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, Springer, Heidelberg (2003)
  • 17
    • 35248877616 scopus 로고    scopus 로고
    • Tylutki, M., Levitt, K.N.: Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. In: Vigna, C., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, Springer, Heidelberg (2003)
    • Tylutki, M., Levitt, K.N.: Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. In: Vigna, C., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, Springer, Heidelberg (2003)
  • 18
    • 84948979531 scopus 로고    scopus 로고
    • Evaluating the impact of automated intrusion response mechanisms
    • Las Vegas, Nevada December 9-13
    • Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 9-13, 2002)
    • (2002) 18th Annual Computer Security Applications Conference
    • Toth, T.1    Kruegel, C.2
  • 19
    • 38149003407 scopus 로고    scopus 로고
    • Prasant, M., Srikanth, K. (eds,): Ad Hoc Networks: Technologies and Protocols (2004)
    • Prasant, M., Srikanth, K. (eds,): Ad Hoc Networks: Technologies and Protocols (2004)
  • 22
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer-based intrusion detection system
    • White, G., Fisch, E., Pooch, U.: Cooperating security managers: A peer-based intrusion detection system. IEEE Network 10, 20-23 (1996)
    • (1996) IEEE Network , vol.10 , pp. 20-23
    • White, G.1    Fisch, E.2    Pooch, U.3
  • 24
    • 84948979531 scopus 로고    scopus 로고
    • Evaluating the impact of automated intrusion response mechanisms
    • Las Vegas, Nevada December 9-13
    • Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 9-13, 2002)
    • (2002) 18th Annual Computer Security Applications Conference
    • Toth, T.1    Kruegel, C.2
  • 25
    • 38148999898 scopus 로고    scopus 로고
    • Nuevo, J.: A Comprehensible GloMoSim Tutorial (March 2004)
    • Nuevo, J.: A Comprehensible GloMoSim Tutorial (March 2004)
  • 26
    • 38149055364 scopus 로고    scopus 로고
    • He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks (2004)
    • He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks (2004)
  • 27
    • 38149039811 scopus 로고    scopus 로고
    • Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of MobiHoc 2002, Lausanne (June 2002)
    • Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of MobiHoc 2002, Lausanne (June 2002)
  • 28
    • 24744432675 scopus 로고    scopus 로고
    • Self-Policing Mobile Ad Hoc Networks by Reputation Systems
    • Buchegger, S., Le Boudee, J.-Y.: Self-Policing Mobile Ad Hoc Networks by Reputation Systems. IEEE Communications Magazine 43(7), 101-107 (2005)
    • (2005) IEEE Communications Magazine , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Le Boudee, J.-Y.2
  • 29


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.