메뉴 건너뛰기




Volumn 58, Issue 5, 2009, Pages 2471-2481

A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks

Author keywords

Ad hoc on demand distance vector (AODV); Anomaly detection; Dynamic learning; Forgetting curve; Malicious attacks; Mobile ad hoc networks (MANETs); Projection distance

Indexed keywords

AD HOC ON-DEMAND DISTANCE VECTOR (AODV); ANOMALY DETECTION; DYNAMIC LEARNING; FORGETTING CURVE; MALICIOUS ATTACKS; MOBILE AD HOC NETWORKS (MANETS); PROJECTION DISTANCE;

EID: 66449085294     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2008.2010049     Document Type: Article
Times cited : (103)

References (45)
  • 1
    • 34547610382 scopus 로고    scopus 로고
    • Secure routing for mobile ad hoc networks
    • Third Quarter
    • P. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks," Commun. Surveys Tuts., vol. 7, no. 3, pp. 2-21, Third Quarter, 2005.
    • (2005) Commun. Surveys Tuts , vol.7 , Issue.3 , pp. 2-21
    • Argyroudis, P.1    O'Mahony, D.2
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec
    • L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Netw., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Netw , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 4
    • 1542287664 scopus 로고    scopus 로고
    • Secure data transmission in mobile ad hoc networks
    • Sep
    • P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in Proc. ACM Workshop WiSE, Sep. 2003, pp. 41-50.
    • (2003) Proc. ACM Workshop WiSE , pp. 41-50
    • Papadimitratos, P.1    Haas, Z.2
  • 5
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 9
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Feb
    • A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Commun., vol. 11, no. 1, pp. 48-60, Feb. 2004.
    • (2004) IEEE Wireless Commun , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 10
    • 67649826837 scopus 로고    scopus 로고
    • A network-based anomaly detection system using multiple network features
    • Mar
    • Y. Waizumi, Y. Sato, and Y. Nemoto, "A network-based anomaly detection system using multiple network features," in Proc. 3rd Int. Conf. WEBIST, Mar. 2007, pp. 410-413.
    • (2007) Proc. 3rd Int. Conf. WEBIST , pp. 410-413
    • Waizumi, Y.1    Sato, Y.2    Nemoto, Y.3
  • 12
    • 58149454270 scopus 로고
    • An ideal equation derived for a class of forgetting curves
    • Sep
    • I. London, "An ideal equation derived for a class of forgetting curves," Psychol. Rev., vol. 57, no. 5, pp. 295-302, Sep. 1950.
    • (1950) Psychol. Rev , vol.57 , Issue.5 , pp. 295-302
    • London, I.1
  • 13
    • 84903836776 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • Jun
    • P. Ning and K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols," in Proc. 4th Annu. IEEE Inf. Assurance Workshop, Jun. 2003, pp. 60-67.
    • (2003) Proc. 4th Annu. IEEE Inf. Assurance Workshop , pp. 60-67
    • Ning, P.1    Sun, K.2
  • 14
    • 70450243327 scopus 로고    scopus 로고
    • On vulnerability and protection of ad hoc on-demand distance vector protocol
    • Feb
    • W. Wang, Y. Lu, and B. Bhargava, "On vulnerability and protection of ad hoc on-demand distance vector protocol," in Proc. 10th ICT, Feb. 2003, pp. 375-382.
    • (2003) Proc. 10th ICT , pp. 375-382
    • Wang, W.1    Lu, Y.2    Bhargava, B.3
  • 19
    • 66449105100 scopus 로고    scopus 로고
    • Homepage, Online, Available
    • A-SAODV Homepage. [Online]. Available: http://saodv.cefriel.it/
    • A-SAODV
  • 20
    • 85008034383 scopus 로고    scopus 로고
    • Securing AODV: The A-SAODV secure routing prototype
    • Feb
    • D. Cerri and A. Ghioni, "Securing AODV: The A-SAODV secure routing prototype," IEEE Commun. Mag., vol. 46, no. 2, pp. 120-125, Feb. 2008.
    • (2008) IEEE Commun. Mag , vol.46 , Issue.2 , pp. 120-125
    • Cerri, D.1    Ghioni, A.2
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Feb
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 23
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May/Jun
    • H. Yih-Chun and A. Perrig, "A survey of secure wireless ad hoc routing," IEEE Security Privacy, vol. 2, no. 3, pp. 28-39, May/Jun. 2004.
    • (2004) IEEE Security Privacy , vol.2 , Issue.3 , pp. 28-39
    • Yih-Chun, H.1    Perrig, A.2
  • 24
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Jan
    • H. Yih-Chun, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol. 11, no. 1/2, pp. 21-38, Jan. 2005.
    • (2005) Wirel. Netw , vol.11 , Issue.1-2 , pp. 21-38
    • Yih-Chun, H.1    Perrig, A.2    Johnson, D.3
  • 25
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Jul
    • H. Yih-Chun, D. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Netw., vol. 1, no. 1, pp. 175-192, Jul. 2003.
    • (2003) Ad Hoc Netw , vol.1 , Issue.1 , pp. 175-192
    • Yih-Chun, H.1    Johnson, D.2    Perrig, A.3
  • 27
    • 15244360279 scopus 로고    scopus 로고
    • An efficient key predistribution scheme for ad hoc network security
    • Mar
    • M. Ramkumar and N. Memon, "An efficient key predistribution scheme for ad hoc network security," IEEE J. Sel. Areas Commun., vol. 23, no. 3, pp. 611-621, Mar. 2005.
    • (2005) IEEE J. Sel. Areas Commun , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2
  • 29
    • 0036804761 scopus 로고    scopus 로고
    • Routing security in ad hoc networks
    • Oct
    • H. Deng, W. Li, and D. Agrawal, "Routing security in ad hoc networks," IEEE Commun. Mag., vol. 40, no. 10, pp. 70-75, Oct. 2002.
    • (2002) IEEE Commun. Mag , vol.40 , Issue.10 , pp. 70-75
    • Deng, H.1    Li, W.2    Agrawal, D.3
  • 30
    • 84954526194 scopus 로고    scopus 로고
    • Robust routing in wireless ad hoc networks
    • Aug
    • S. Lee, B. Han, and M. Shin, "Robust routing in wireless ad hoc networks," in Proc. 31st ICPP Workshops, Aug. 2002, pp. 73-78.
    • (2002) Proc. 31st ICPP Workshops , pp. 73-78
    • Lee, S.1    Han, B.2    Shin, M.3
  • 31
    • 84969513597 scopus 로고    scopus 로고
    • Effective intrusion detection using multiple sensors in wireless ad hoc networks
    • Jan
    • O. Kachirski and R. Guha, "Effective intrusion detection using multiple sensors in wireless ad hoc networks," in Proc. 36th Annu. HICSS, Jan. 2003, pp. 57-64.
    • (2003) Proc. 36th Annu. HICSS , pp. 57-64
    • Kachirski, O.1    Guha, R.2
  • 34
    • 0037629724 scopus 로고    scopus 로고
    • Cross-feature analysis for detecting ad-hoc routing anomalies
    • May
    • Y. Huang, W. Fan, W. Lee, and P. Yu, "Cross-feature analysis for detecting ad-hoc routing anomalies," in Proc. 23rd ICDCS, May 2003, pp. 478-487.
    • (2003) Proc. 23rd ICDCS , pp. 478-487
    • Huang, Y.1    Fan, W.2    Lee, W.3    Yu, P.4
  • 35
    • 34548323745 scopus 로고    scopus 로고
    • Attack analysis and detection for ad hoc routing protocols
    • Sep
    • Y. Huang and W. Lee, "Attack analysis and detection for ad hoc routing protocols," in Proc. 7th Int. Symp. RAID, Sep. 2004, pp. 125-145.
    • (2004) Proc. 7th Int. Symp. RAID , pp. 125-145
    • Huang, Y.1    Lee, W.2
  • 36
    • 18144421528 scopus 로고    scopus 로고
    • Towards adaptive intrusion detection in mobile ad hoc networks
    • Nov./Dec
    • B. Sun, K. Wu, and U. Pooch, "Towards adaptive intrusion detection in mobile ad hoc networks," in Proc. IEEE Global Telecommun. Conf. GLOBECOM, Nov./Dec. 2004, pp. 3551-3555.
    • (2004) Proc. IEEE Global Telecommun. Conf. GLOBECOM , pp. 3551-3555
    • Sun, B.1    Wu, K.2    Pooch, U.3
  • 39
    • 0032667063 scopus 로고    scopus 로고
    • The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
    • Aug
    • D. Maltz, J. Broch, J. Jetcheva, and D. Johnson, "The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks," IEEE J. Sel. Areas Commun., vol. 17, no. 8, pp. 1439-1453, Aug. 1999.
    • (1999) IEEE J. Sel. Areas Commun , vol.17 , Issue.8 , pp. 1439-1453
    • Maltz, D.1    Broch, J.2    Jetcheva, J.3    Johnson, D.4
  • 40
    • 0035249889 scopus 로고    scopus 로고
    • Performance comparison of two on-demand routing protocols for ad hoc networks
    • Feb
    • C. Perkins, E. Royer, S. Das, and M. Marina, "Performance comparison of two on-demand routing protocols for ad hoc networks," IEEE Pers. Commun., vol. 8, no. 1, pp. 16-28, Feb. 2001.
    • (2001) IEEE Pers. Commun , vol.8 , Issue.1 , pp. 16-28
    • Perkins, C.1    Royer, E.2    Das, S.3    Marina, M.4
  • 41
    • 0038675868 scopus 로고    scopus 로고
    • A survey of mobility models for ad hoc network research
    • Sep
    • T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wirel. Commun. Mob. Comput., vol. 2, no. 5, pp. 483-502, Sep. 2002.
    • (2002) Wirel. Commun. Mob. Comput , vol.2 , Issue.5 , pp. 483-502
    • Camp, T.1    Boleng, J.2    Davies, V.3
  • 44
    • 33747210407 scopus 로고    scopus 로고
    • Description logics for an autonomic ids event analysis system
    • Sep
    • W. Yan, E. Hou, and N. Ansari, "Description logics for an autonomic ids event analysis system," Comput. Commun., vol. 29, no. 15, pp. 2841-2852, Sep. 2006.
    • (2006) Comput. Commun , vol.29 , Issue.15 , pp. 2841-2852
    • Yan, W.1    Hou, E.2    Ansari, N.3
  • 45
    • 24144468632 scopus 로고    scopus 로고
    • Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks
    • May
    • W. Yan, E. Hou, and N. Ansari, "Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks," in Proc. IEEE ICC, May 2005, pp. 1512-1517.
    • (2005) Proc. IEEE ICC , pp. 1512-1517
    • Yan, W.1    Hou, E.2    Ansari, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.