메뉴 건너뛰기




Volumn , Issue , 2009, Pages 95-102

A grammatical evolution approach to intrusion detection on mobile ad hoc networks

Author keywords

Artificial intelligence; Grammatical evolution; Intrusion detection; Mobile ad hoc networks; Security

Indexed keywords

CENTRAL POINT; DESIGN SPACES; DISASTER RECOVERY; DOS ATTACKS; DYNAMIC NATURE; GRAMMATICAL EVOLUTION; LEARNING TECHNIQUES; NATURAL EVOLUTION; RESEARCH TOPICS; SECURITY; SECURITY RISKS; TRAFFIC PATTERN;

EID: 70349104194     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1514274.1514289     Document Type: Conference Paper
Times cited : (23)

References (28)
  • 1
    • 70349145019 scopus 로고    scopus 로고
    • Bonnmotion: A mobility scenario generation and analysis tool
    • Bonnmotion: A mobility scenario generation and analysis tool.
  • 2
    • 70349091517 scopus 로고    scopus 로고
    • Iibge: A C++ library for grammatical evolution.
    • Iibge: A C++ library for grammatical evolution.
  • 3
    • 70349141877 scopus 로고    scopus 로고
    • Ns-2: The network simulator.
    • Ns-2: The network simulator.
  • 12
    • 4544258840 scopus 로고    scopus 로고
    • Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In In Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
    • Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In In Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
  • 13
    • 2442417706 scopus 로고    scopus 로고
    • J. P. A. J. J. Parker, J. Undercoffer. On intrusion detection and response for mobile ad hoc networks. In 23th IEEE Int. Performance Computing and Communications Conference Proceedings, 2004.
    • J. P. A. J. J. Parker, J. Undercoffer. On intrusion detection and response for mobile ad hoc networks. In 23th IEEE Int. Performance Computing and Communications Conference Proceedings, 2004.
  • 15
    • 70349148309 scopus 로고    scopus 로고
    • Y. Lu, Y. Zhong, and B. Bhargava. Packet loss in mobile ad hoc networks. TR 03-009, Dept. of Computer Science, Purdue University, April.
    • Y. Lu, Y. Zhong, and B. Bhargava. Packet loss in mobile ad hoc networks. TR 03-009, Dept. of Computer Science, Purdue University, April.
  • 16
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Proc. of ACM Int, MOBICOM
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In In Proc. of ACM Int. Conf. on Mobile Computing and Networking (MOBICOM), pages 255-265, 2000.
    • (2000) Conf. on Mobile Computing and Networking , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 18
    • 33745794758 scopus 로고    scopus 로고
    • An approach to implement a network intrusion detection system using genetic algorithms
    • M. Pillai, J. Eloff, and H. Venter. An approach to implement a network intrusion detection system using genetic algorithms. In SAISCIT Proceedings, pages 221-228, 2004.
    • (2004) SAISCIT Proceedings , pp. 221-228
    • Pillai, M.1    Eloff, J.2    Venter, H.3
  • 19
    • 84958950397 scopus 로고    scopus 로고
    • Grammatical evolution: Evolving programs for an arbitrary language
    • 1st European Workshop on Genetic Programming Proceedings, Springer
    • C. Ryan, J. Colline, and M. O'Neill. Grammatical evolution: Evolving programs for an arbitrary language. In 1st European Workshop on Genetic Programming Proceedings, LNCS 1391, pages 83-95. Springer, 1998.
    • (1998) LNCS , vol.1391 , pp. 83-95
    • Ryan, C.1    Colline, J.2    O'Neill, M.3
  • 20
    • 59349102011 scopus 로고    scopus 로고
    • Evolving intrusion detection rules on mobile ad hoc networks
    • Proceedings of the PRICAI, Springer
    • S. Sen and J. A. Clark. Evolving intrusion detection rules on mobile ad hoc networks. In Proceedings of the PRICAI, LNAI 5351, pages 1053-1058. Springer, 2008.
    • (2008) LNAI , vol.5351 , pp. 1053-1058
    • Sen, S.1    Clark, J.A.2
  • 22
    • 85005954407 scopus 로고    scopus 로고
    • B. Sun, K. Wu, and U. Pooch. Zone-based intrusion detection for mobile ad hoc networks. Int. Journal of Ad Hoc and Sensor Wireless Networks, 2(3), 2003.
    • B. Sun, K. Wu, and U. Pooch. Zone-based intrusion detection for mobile ad hoc networks. Int. Journal of Ad Hoc and Sensor Wireless Networks, 2(3), 2003.
  • 23
    • 33750370441 scopus 로고    scopus 로고
    • C. Tseng, S.-H. Wang, W. Lee, C. Ko, and K. Lewitt. Demem: Distributed evidence driven message exchange intrusion detection model for manet. In In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID'06), pages 249-271. Springer, 2006.
    • C. Tseng, S.-H. Wang, W. Lee, C. Ko, and K. Lewitt. Demem: Distributed evidence driven message exchange intrusion detection model for manet. In In Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID'06), pages 249-271. Springer, 2006.
  • 24
    • 4544342574 scopus 로고    scopus 로고
    • C.-Y. Tseng, P. Balasubramayan, C. Ko, R. Limprasittiporn, J. Rowe, and K. Lewitt. A specification-based intrusion detection system for aodv. In In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), 2003.
    • C.-Y. Tseng, P. Balasubramayan, C. Ko, R. Limprasittiporn, J. Rowe, and K. Lewitt. A specification-based intrusion detection system for aodv. In In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), 2003.
  • 26
    • 33847739307 scopus 로고    scopus 로고
    • Knowledge extraction from kdd'99 intrusion data using grammatical evolution
    • February
    • D. Wilson and D. Kaur. Knowledge extraction from kdd'99 intrusion data using grammatical evolution. WSEAS Transactions on Information Science and Applications, 4:237-244, February 2007.
    • (2007) WSEAS Transactions on Information Science and Applications , vol.4 , pp. 237-244
    • Wilson, D.1    Kaur, D.2
  • 27
    • 26844476455 scopus 로고    scopus 로고
    • Applying genetic programming to evolve learned rules for network anomaly detection
    • ICNC Proceedings, Springer
    • C. Yin, S. Tian, H. Huang, and J. He. Applying genetic programming to evolve learned rules for network anomaly detection. In ICNC Proceedings, LNCS 3612, pages 323-331. Springer, 2005.
    • (2005) LNCS , vol.3612 , pp. 323-331
    • Yin, C.1    Tian, S.2    Huang, H.3    He, J.4
  • 28
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • September
    • Y. Zhang, W. Lee, and Y. an Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networks Journal (ACM WINET), 2(5), September 2003.
    • (2003) Wireless Networks Journal (ACM WINET) , vol.2 , Issue.5
    • Zhang, Y.1    Lee, W.2    an Huang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.