메뉴 건너뛰기




Volumn , Issue , 2003, Pages 125-134

A specification-based intrusion detection system for AODV

Author keywords

AODV; Intrusion detection; MANET; Network monitor; P2P network; Specification based detection

Indexed keywords

COMPUTER OPERATING SYSTEMS; DATA STRUCTURES; GATEWAYS (COMPUTER NETWORKS); NETWORK PROTOCOLS; ROUTERS; SECURITY OF DATA; TELECOMMUNICATION LINKS; TELECOMMUNICATION NETWORKS;

EID: 4544342574     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/986858.986876     Document Type: Conference Paper
Times cited : (200)

References (20)
  • 1
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile adhoc routing protocols
    • West Point, June
    • Peng Ning, Run Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Adhoc Routing Protocols," in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.
    • (2003) Proceedings of the 4th Annual IEEE Information Assurance Workshop , pp. 60-67
    • Ning, P.1    Sun, R.2
  • 3
    • 0042877095 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Swiss Federal Institute of Technology, Lausanne, August
    • L. Buttyán and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks Technical Report No. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, August 2001
    • (2001) Technical Report No. DSC/2001/046 , vol.DSC-2001-046
    • Buttyán, L.1    Hubaux, J.-P.2
  • 5
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. Kemmerer, and P. Porras, "State Transition Analysis: A Rule-based Intrusion Detection Approach", IEEE Transactions of Software Engineering, 2(13):181-199, March 1995.
    • (1995) IEEE Transactions of Software Engineering , vol.2 , Issue.13 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 6
    • 0004118981 scopus 로고
    • The NIDES statistical component description and justification
    • Computer Science Laboratory, SRI International, Menlo Park, CA, Mar
    • H. Javitz and A. Valdes, "The NIDES Statistical Component Description and Justification," Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, Mar 1994.
    • (1994) Technical Report
    • Javitz, H.1    Valdes, A.2
  • 10
  • 13
    • 0842331554 scopus 로고    scopus 로고
    • Detection of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
    • R. Rao and G. Kesidis, "Detection of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited", Brazilian Journal of Telecommunications,2003
    • (2003) Brazilian Journal of Telecommunications
    • Rao, R.1    Kesidis, G.2
  • 17
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing ad hoc networks. In IEEE Networks, 13(6):24-30, 1999.
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 20
    • 4544317839 scopus 로고    scopus 로고
    • Private Communication
    • E. Belding-Royer, Private Communication, 2003.
    • (2003)
    • Belding-Royer, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.