메뉴 건너뛰기




Volumn , Issue , 2007, Pages 220-225

Distributed hierarchical IDS for MANET over AODV+

Author keywords

Ad hoc on demand distance vector (AODV+); Distributed hierarchical IDS; Mobile ad hoc network (MANET); Mobile agent and network simulator (NS2)

Indexed keywords

ACCESS CONTROL; AGENTS; CHLORINE COMPOUNDS; COMPUTER CRIME; INTRUSION DETECTION; MOBILE AGENTS; MOBILE TELECOMMUNICATION SYSTEMS; ROUTING PROTOCOLS; SECURITY OF DATA; SENSORS; SIGNAL DETECTION; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SYSTEMS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 48349105162     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICTMICC.2007.4448633     Document Type: Conference Paper
Times cited : (11)

References (16)
  • 1
    • 77956574096 scopus 로고    scopus 로고
    • Challenges in intrusion detection for wireless ad-hoc networks
    • P. Brutch, and C. Ko, "Challenges in intrusion detection for wireless ad-hoc networks," Applications and the Internet Workshops, 2003, pp. 368-373.
    • (2003) Applications and the Internet Workshops , pp. 368-373
    • Brutch, P.1    Ko, C.2
  • 2
    • 48349114636 scopus 로고    scopus 로고
    • The National Institute of Standards and Technology.ANTDwebmaster.Mav,2001 . Mobile ad hoc network. Available: http://w3.antd.nist.gov
    • The National Institute of Standards and Technology.ANTDwebmaster.Mav,2001 . Mobile ad hoc network. Available: http://w3.antd.nist.gov
  • 3
    • 24344460142 scopus 로고    scopus 로고
    • A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
    • Master's thesis, Lund Institute of Technology, Sweden, January, Available
    • A. Hamidian, "A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2", Master's thesis, Lund Institute of Technology, Sweden, January 2003, Available: http://www.telecom.lth.se/Personal/alexh/rapport.pdf
    • (2003)
    • Hamidian, A.1
  • 4
    • 84950162203 scopus 로고    scopus 로고
    • O. Kachirski, and R. Guha, Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks. Proceedings of the IEEE Workshop on Knowledge Media Networking,2002,pp.l53-158.
    • O. Kachirski, and R. Guha, "Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks". Proceedings of the IEEE Workshop on Knowledge Media Networking,2002,pp.l53-158.
  • 5
    • 1842665110 scopus 로고    scopus 로고
    • A. Mishra, K. Nadkarni, and A. Patcha, Intrusion detection in wireless ad hoc networks, Proceedings of IEEE Personal Communications. 11, 2004, pp. 48-60.
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," Proceedings of IEEE Personal Communications. Vol. 11, 2004, pp. 48-60.
  • 8
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM/ Kluwer Wireless Networks Journal, vol. 9, 2003, pp. 545-556.
    • (2003) ACM/ Kluwer Wireless Networks Journal , vol.9 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 10
    • 34547238643 scopus 로고    scopus 로고
    • An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks
    • A. Smith, "An Examination of an Intrusion Detection Architecture for Wireless Ad Hoc Networks," 5th Nat'l, Colloq. for Info. Sys. Sec. Education, 2001.
    • (2001) 5th Nat'l, Colloq. for Info. Sys. Sec. Education
    • Smith, A.1
  • 11
    • 48349148400 scopus 로고    scopus 로고
    • P. Albers, O. Camp, Percher, J. Bernard, Ludovic and R. Puttini, Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches, 1st Int'l. Wksp. Wireless Info. Sys.,Ciudad Real, Spain, pp. 3-6, 2002.
    • P. Albers, O. Camp, Percher, J. Bernard, Ludovic and R. Puttini, "Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches," 1st Int'l. Wksp. Wireless Info. Sys.,Ciudad Real, Spain, pp. 3-6, 2002.
  • 13
    • 28344455767 scopus 로고    scopus 로고
    • A. Hijazi, and N. Nasser, Wireless Using mobile agents for intrusion detection in wireless ad hoc networks, Published Second 1FIP International Conference on March 2005, pp. 362-366.
    • A. Hijazi, and N. Nasser, "Wireless Using mobile agents for intrusion detection in wireless ad hoc networks," Published Second 1FIP International Conference on March 2005, pp. 362-366.
  • 15
    • 85178866429 scopus 로고    scopus 로고
    • B. Sun, H., Chenand, and L. Li, An intrusion detection system for AODV, ICECCS 2005. Proceedings of 10th IEEE International Conference on Engineering of Complex Computer Systems, 2005, pp. 358-365.
    • B. Sun, H., Chenand, and L. Li, "An intrusion detection system for AODV," ICECCS 2005. Proceedings of 10th IEEE International Conference on Engineering of Complex Computer Systems, 2005, pp. 358-365.
  • 16
    • 21644441634 scopus 로고    scopus 로고
    • G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, An intrusion detection tool for AODV-based ad hoc wireless networks, Computer Security Applications Conference, 2004, 20th Annual 6-10 Dec, pp. 16-27.
    • G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, "An intrusion detection tool for AODV-based ad hoc wireless networks," Computer Security Applications Conference, 2004, 20th Annual 6-10 Dec, pp. 16-27.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.