메뉴 건너뛰기




Volumn , Issue , 2009, Pages 926-930

Adaptive intrusion detection and prevention of denial of service attacks in MANETs

Author keywords

Ad hoc network security; Intrusion detection and prevention

Indexed keywords

FLOWCHARTING; INTRUSION DETECTION; MOBILE AD HOC NETWORKS; MOBILE SECURITY; NETWORK SECURITY; STATISTICAL PROCESS CONTROL; STATISTICAL TESTS;

EID: 70450228601     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1582379.1582581     Document Type: Conference Paper
Times cited : (43)

References (17)
  • 1
    • 33745479804 scopus 로고    scopus 로고
    • Theoretical Basis for Intrusion Detection
    • Information Assurance and Security, pp, 15-17 June
    • Z.Li, A.Das, and J.Zhou, "Theoretical Basis for Intrusion Detection", IEEE Proc. Information Assurance and Security, pp 184-192, 15-17 June 2005.
    • (2005) IEEE Proc , pp. 184-192
    • Li, Z.1    Das, A.2    Zhou, J.3
  • 4
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y.Hu, B.Johnson and A.Perrig, " SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks", Ad hoc Networks, Vol.1, pp 175-192, 2003.
    • (2003) Ad hoc Networks , vol.1 , pp. 175-192
    • Hu, Y.1    Johnson, B.2    Perrig, A.3
  • 6
    • 4143065848 scopus 로고    scopus 로고
    • A Secure On Demand Routing Protocol for Ad-Hoc networks
    • September
    • Y.Hu, A.Perrig and B.Johnson, "A Secure On Demand Routing Protocol for Ad-Hoc networks", Proc. MobiCom, pp 23-28, September 2002.
    • (2002) Proc. MobiCom , pp. 23-28
    • Hu, Y.1    Perrig, A.2    Johnson, B.3
  • 7
    • 85065642646 scopus 로고    scopus 로고
    • On Vulnerability and Protection of Ad Hoc On Demand Distance Vector Protocol
    • W.Wang, Y.Lu and K.Bhargava," On Vulnerability and Protection of Ad Hoc On Demand Distance Vector Protocol", IEEE Proc. ICT, Vol.1, pp 357-382, 2003.
    • (2003) IEEE Proc. ICT , vol.1 , pp. 357-382
    • Wang, W.1    Lu, Y.2    Bhargava, K.3
  • 11
    • 85022227472 scopus 로고    scopus 로고
    • A Reconfigurable Architecture for Network Intrusion Detection Using Principal Component Analysis
    • D.Nguyen, Das, Memik and Choudhary," A Reconfigurable Architecture for Network Intrusion Detection Using Principal Component Analysis", ACM Int Symposium on Field Programmable Gate Arrays, 2006.
    • (2006) ACM Int Symposium on Field Programmable Gate Arrays
    • Nguyen, D.1    Das, M.2    Choudhary3
  • 12
    • 85184629381 scopus 로고    scopus 로고
    • N.Ye, X.Li, M.Emran and M.Xu, Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data, IEEE Transactions on Systems, Man & Cybernetics, 31.No.4,pp 266-274, Jully 2001.
    • N.Ye, X.Li, ,M.Emran and M.Xu," Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data", IEEE Transactions on Systems, Man & Cybernetics, Vol.31.No.4,pp 266-274, Jully 2001.
  • 13
    • 0035271352 scopus 로고    scopus 로고
    • An Anomaly Detection Techniques based on a CHI-SQUARE Statistics for Detecting Intrusion into Information System
    • N.Ye and Q.Chen," An Anomaly Detection Techniques based on a CHI-SQUARE Statistics for Detecting Intrusion into Information System" Quality and Reliability Engineering International, 2001.
    • (2001) Quality and Reliability Engineering International
    • Ye, N.1    Chen, Q.2
  • 14
    • 35348879637 scopus 로고    scopus 로고
    • The Sleep Deprivation Attack in Sensor Networks:Analysis and Methods of Defence
    • M.Pirrete and R.Brooks, "The Sleep Deprivation Attack in Sensor Networks:Analysis and Methods of Defence", Journal of Distributed Sensor Networks, Vol.2,No.3,pp 267-287,2006.
    • (2006) Journal of Distributed Sensor Networks , vol.2 , Issue.3 , pp. 267-287
    • Pirrete, M.1    Brooks, R.2
  • 15
    • 1542317831 scopus 로고    scopus 로고
    • Rushing Attack and Defence in Wireless Ad Hoc Networks Routing Protocol, 2nd ACM Workshop on Wireless
    • Y.Hu, A.Perrig and B.Johnson," Rushing Attack and Defence in Wireless Ad Hoc Networks Routing Protocol", 2nd ACM Workshop on Wireless Security, pp 30-40, 2003.
    • (2003) Security , pp. 30-40
    • Hu, Y.1    Perrig, A.2    Johnson, B.3
  • 17
    • 85184646464 scopus 로고    scopus 로고
    • KDD data set, 1999, can be accessed at http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html.
    • KDD data set, 1999, can be accessed at http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.