메뉴 건너뛰기




Volumn 7, Issue 1, 2009, Pages 171-182

LIDF: Layered intrusion detection framework for ad-hoc networks

Author keywords

Ad hoc networks; Collection; Detection and alert modules; Framework

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; INTRUSION DETECTION; NETWORK PROTOCOLS; SECURITY OF DATA; SENSOR NETWORKS; TELECOMMUNICATION NETWORKS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 53749101677     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2008.01.001     Document Type: Article
Times cited : (28)

References (29)
  • 1
    • 0035178273 scopus 로고    scopus 로고
    • S. Bhargava, D. Agrawal, Security enhancements in aodv protocol for wireless ad-hoc networks, in: Proceedings of IEEE Vehicular Techology Conference, IEEE CS Press, 2001, pp. 2143-2147.
    • S. Bhargava, D. Agrawal, Security enhancements in aodv protocol for wireless ad-hoc networks, in: Proceedings of IEEE Vehicular Techology Conference, IEEE CS Press, 2001, pp. 2143-2147.
  • 2
    • 18144421528 scopus 로고    scopus 로고
    • Bo Sun, Kui Wu, U.W. Pooch, Towards adaptive intrusion detection in mobile ad-hoc networks, in: IEEE Global Telecommunications Conference (GLOBECOM'04), vol. 6, 29 November-3 December 2004, pp. 3551-3555, doi:10.1109/GLOCOM.2004.1379027.
    • Bo Sun, Kui Wu, U.W. Pooch, Towards adaptive intrusion detection in mobile ad-hoc networks, in: IEEE Global Telecommunications Conference (GLOBECOM'04), vol. 6, 29 November-3 December 2004, pp. 3551-3555, doi:10.1109/GLOCOM.2004.1379027.
  • 3
    • 77956574096 scopus 로고    scopus 로고
    • P. Brutch, C. Ko, Challenges in intrusion detection for wireless ad-hoc networks, in: Symposium on Applications and the Internet Workshops, 27-31 January 2003, pp. 368-373.
    • P. Brutch, C. Ko, Challenges in intrusion detection for wireless ad-hoc networks, in: Symposium on Applications and the Internet Workshops, 27-31 January 2003, pp. 368-373.
  • 5
    • 30144440941 scopus 로고    scopus 로고
    • Dempster-Shafer theory for intrusion detection in ad-hoc networks
    • 10.1109/MIC.2005.123
    • Chen T.M., and Venkataramanan V. Dempster-Shafer theory for intrusion detection in ad-hoc networks. IEEE Internet Computing 9 6 (2005) 35-41 10.1109/MIC.2005.123
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 35-41
    • Chen, T.M.1    Venkataramanan, V.2
  • 7
    • 33747289360 scopus 로고    scopus 로고
    • A. Hasswa, M. Zulkernine, H. Hassanein, Routeguard: an intrusion detection and response system for mobile ad-hoc networks, in: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2005), vol. 3, 22-24 August 2005, pp. 336-343, doi:10.1109/WIMOB.2005.1512922.
    • A. Hasswa, M. Zulkernine, H. Hassanein, Routeguard: an intrusion detection and response system for mobile ad-hoc networks, in: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'2005), vol. 3, 22-24 August 2005, pp. 336-343, doi:10.1109/WIMOB.2005.1512922.
  • 8
    • 28344455767 scopus 로고    scopus 로고
    • A. Hijazi, N. Nasser, "Using mobile agents for intrusion detection in wireless ad-hoc networks", in: Second IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2005), 6-8 March, 2005, pp. 362-366. (doi:10.1109/WOCN.2005.1436049).
    • A. Hijazi, N. Nasser, "Using mobile agents for intrusion detection in wireless ad-hoc networks", in: Second IFIP International Conference on Wireless and Optical Communications Networks (WOCN 2005), 6-8 March, 2005, pp. 362-366. (doi:10.1109/WOCN.2005.1436049).
  • 9
    • 33846997515 scopus 로고    scopus 로고
    • Jianhua Song, Fan Hong, Yajun Guo, A distributed monitoring mechanism for mobile ad-hoc networks, in: Eighth International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN 2005), 7-9 December 2005, pp. 236-240, doi:10.1109/ISPAN.2005.6.
    • Jianhua Song, Fan Hong, Yajun Guo, A distributed monitoring mechanism for mobile ad-hoc networks, in: Eighth International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN 2005), 7-9 December 2005, pp. 236-240, doi:10.1109/ISPAN.2005.6.
  • 10
    • 84866538231 scopus 로고    scopus 로고
    • F. Kargl, A. Klenk, M. Weber, S. Schlott, Sensors for detection of misbehaving nodes in MANETs, in: Proceedings of Detection of Intrusion and Malware and Vulnerability Assessment, Germany, 6-7 July 2004.
    • F. Kargl, A. Klenk, M. Weber, S. Schlott, Sensors for detection of misbehaving nodes in MANETs, in: Proceedings of Detection of Intrusion and Malware and Vulnerability Assessment, Germany, 6-7 July 2004.
  • 12
    • 33845889547 scopus 로고    scopus 로고
    • Detecting unauthorized and compromised nodes in mobile ad-hoc networks
    • Komninos N., Vergados D., and Douligeris C. Detecting unauthorized and compromised nodes in mobile ad-hoc networks. Journal in Ad Hoc Networks 5 3 (2006) 289-298
    • (2006) Journal in Ad Hoc Networks , vol.5 , Issue.3 , pp. 289-298
    • Komninos, N.1    Vergados, D.2    Douligeris, C.3
  • 15
    • 53749099877 scopus 로고    scopus 로고
    • A. Mitrokotsa, N. Komninos, C. Douligeris, Intrusion detection & response in ad-hoc networks, in: N. Komninos (Ed.), Special Issue on Advances on Ad Hoc Network Security, International Journal on Computer Research 15(1) (2007).
    • A. Mitrokotsa, N. Komninos, C. Douligeris, Intrusion detection & response in ad-hoc networks, in: N. Komninos (Ed.), Special Issue on Advances on Ad Hoc Network Security, International Journal on Computer Research 15(1) (2007).
  • 16
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • 10.1109/MWC.2004.1269717
    • Mishra A., Nadkarni K., and Patcha A. Intrusion detection in wireless ad-hoc networks. IEEE Wireless Communications 11 1 (2004) 48-60 10.1109/MWC.2004.1269717
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 17
    • 4544334682 scopus 로고    scopus 로고
    • K. Nadkarni, A. Mishra, A novel intrusion detection approach for wireless ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 2, pp. 831-836.
    • K. Nadkarni, A. Mishra, A novel intrusion detection approach for wireless ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 2, pp. 831-836.
  • 18
    • 15944395410 scopus 로고    scopus 로고
    • A. Patcha, J.-M Park, A game theoretic approach to modeling intrusion detection in mobile ad-hoc networks, in: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 10-11 June 2004, pp. 280-284 (doi:10.1109/IAW.2004.1437828).
    • A. Patcha, J.-M Park, A game theoretic approach to modeling intrusion detection in mobile ad-hoc networks, in: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 10-11 June 2004, pp. 280-284 (doi:10.1109/IAW.2004.1437828).
  • 19
    • 53749086854 scopus 로고    scopus 로고
    • C.E. Perkins, E.M. Belding-Royer, I. Chakeres, Ad Hoc On-Demand Distance-Vector Routing (AODV), IETF Internet Draft, October 2003.
    • C.E. Perkins, E.M. Belding-Royer, I. Chakeres, Ad Hoc On-Demand Distance-Vector Routing (AODV), IETF Internet Draft, October 2003.
  • 20
    • 84890079004 scopus 로고    scopus 로고
    • L. Stamouli, P.G. Argyroudis, H. Tewari, Real-time intrusion detection for ad-hoc networks, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), 13-16 June 2005, pp. 374-380 (doi:10.1109/WOWMOM.2005.85).
    • L. Stamouli, P.G. Argyroudis, H. Tewari, Real-time intrusion detection for ad-hoc networks, in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), 13-16 June 2005, pp. 374-380 (doi:10.1109/WOWMOM.2005.85).
  • 22
    • 84952307800 scopus 로고    scopus 로고
    • B. Sun, K. Wu, U.W. Pooch, Routing anomaly detection in mobile ad-hoc networks. in: The 12th International Conference on Computer Communications and Networks (ICCCN 2003), 20-22 October 2003, pp. 25-31, doi: 10.1109/ICCCN.2003.1284145.
    • B. Sun, K. Wu, U.W. Pooch, Routing anomaly detection in mobile ad-hoc networks. in: The 12th International Conference on Computer Communications and Networks (ICCCN 2003), 20-22 October 2003, pp. 25-31, doi: 10.1109/ICCCN.2003.1284145.
  • 23
    • 53749083826 scopus 로고    scopus 로고
    • G. Thamilarasu, A. Balasubramanian, S. Mishra, R. Sridhar, A cross-layer based intrusion detection approach for wireless ad-hoc networks, in: IEEE International Conference on Mobile Adhoc and Sensor Systems, 7 November 2005, pp. 855-861, doi:10.1109/MAHSS.2005.1542882.
    • G. Thamilarasu, A. Balasubramanian, S. Mishra, R. Sridhar, A cross-layer based intrusion detection approach for wireless ad-hoc networks, in: IEEE International Conference on Mobile Adhoc and Sensor Systems, 7 November 2005, pp. 855-861, doi:10.1109/MAHSS.2005.1542882.
  • 24
    • 4544267132 scopus 로고    scopus 로고
    • D. Watkins, C. Scott, Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 1, pp. 622-627.
    • D. Watkins, C. Scott, Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC. 2004), 21-25 March 2004, vol. 1, pp. 622-627.
  • 25
    • 6344287668 scopus 로고    scopus 로고
    • Yan Xia, Ren-Fa Li, Ken-Li Li, Intrusion detection using mobile agent in ad-hoc networks, in: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 26-29 August 2004, vol. 6, pp. 3383-3388.
    • Yan Xia, Ren-Fa Li, Ken-Li Li, Intrusion detection using mobile agent in ad-hoc networks, in: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 26-29 August 2004, vol. 6, pp. 3383-3388.
  • 26
    • 33745457611 scopus 로고    scopus 로고
    • Yu Liu, Yang Li, Hong Man, MAC layer anomaly detection in ad-hoc networks, in: Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 15-17 June 2005, pp. 402-409, doi:10.1109/IAW.2005.1495980.
    • Yu Liu, Yang Li, Hong Man, MAC layer anomaly detection in ad-hoc networks, in: Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 15-17 June 2005, pp. 402-409, doi:10.1109/IAW.2005.1495980.
  • 27
    • 85177501768 scopus 로고    scopus 로고
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, United States, 2000, pp. 275-283.
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, United States, 2000, pp. 275-283.
  • 28
    • 0038011179 scopus 로고    scopus 로고
    • R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwary, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, in: Proceedings of the nineth ACM Conference on Computer and Communication Security, 2002, pp. 265-274.
    • R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwary, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, in: Proceedings of the nineth ACM Conference on Computer and Communication Security, 2002, pp. 265-274.
  • 29
    • 2642547913 scopus 로고    scopus 로고
    • James C. Reynolds, James Just, Larry Clough, Ryan Maglich, On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization, in: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), 2003.
    • James C. Reynolds, James Just, Larry Clough, Ryan Maglich, On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization, in: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.