메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A self-organized agent-based architecture for power-aware intrusion detection in wireless ad-hoc networks

Author keywords

Ad hoc networks; Adaptive resonance theory; Agent based architectures for intrusion detection; Self organizing maps

Indexed keywords

ADAPTIVE RESONANCE THEORY; AGENT ARCHITECTURES; AGENT-BASED ARCHITECTURE; AGENT-BASED ARCHITECTURES FOR INTRUSION DETECTION; AVAILABLE BANDWIDTH; INFORMATION FILES; KOHONEN SELF-ORGANIZING MAPS; MONI-TORING NODES; POWER LEVELS; POWER-AWARE; REPETITIVE TRAINING; SELF-ORGANIZED; TWO PHASIS; UNAUTHORIZED USERS;

EID: 71249117972     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICOCI.2006.5276609     Document Type: Conference Paper
Times cited : (18)

References (26)
  • 1
    • 0003478316 scopus 로고
    • The architecture of a network level intrusion detection system,
    • Technical report, Computer Science Department, University of New Mexico
    • Heady, R., Luger, G., Maccabe, A., and Servilla, M, "The architecture of a network level intrusion detection system," Technical report, Computer Science Department, University of New Mexico, 1990.
    • (1990)
    • Heady, R.1    Luger, G.2    Maccabe, A.3    Servilla, M.4
  • 3
    • 0003456435 scopus 로고    scopus 로고
    • Secure Ad hoc On-Demand Distance Vector (SAODV) Routing
    • IETF MANET Mailing List, Message-ID 3BC17B40.BBF52E09
    • Zapata, M.G., "Secure Ad hoc On-Demand Distance Vector (SAODV) Routing," IETF MANET Mailing List, Message-ID 3BC17B40.BBF52E09, 2002.
    • (2002)
    • Zapata, M.G.1
  • 5
    • 26444616647 scopus 로고    scopus 로고
    • T.Srinivasan,Jayesh Seshadri,J.B.Sidharth Jonathan,Arvind Chandrasekhar, A System for Power Aware Intrusion Detection in Wireless Ad-Hoc Networks, In Proceedings of Third International Conference on Computer Networks and Mobile Computing - ICCNMC 2005, Springer-Verlag Berlin Heidelberg, LNCS 3619, pp.153-162, Zhangjiajie, China, August 3-5 2005
    • T.Srinivasan,Jayesh Seshadri,J.B.Sidharth Jonathan,Arvind Chandrasekhar, "A System for Power Aware Intrusion Detection in Wireless Ad-Hoc Networks," In Proceedings of Third International Conference on Computer Networks and Mobile Computing - ICCNMC 2005, Springer-Verlag Berlin Heidelberg, LNCS 3619, pp.153-162, Zhangjiajie, China, August 3-5 2005
  • 8
    • 0033684488 scopus 로고    scopus 로고
    • Bernardes, M.C., and Moreira, E.S., Implementation of an intrusion detection system based on mobile agents, In Proceedings of International Symposium on Software Engineering for Parallel and Distributed Systems,2000.
    • Bernardes, M.C., and Moreira, E.S., "Implementation of an intrusion detection system based on mobile agents," In Proceedings of International Symposium on Software Engineering for Parallel and Distributed Systems,2000.
  • 9
    • 0034546898 scopus 로고    scopus 로고
    • Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
    • MobiCom, pp
    • Zhang, Y., and Lee, W., "Intrusion detection in wireless adhoc networks," Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom, pp. 275-283, 2000.
    • (2000) , pp. 275-283
    • Zhang, Y.1    Lee, W.2
  • 12
    • 26744432427 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems,
    • Technical Report 96-3, Portland State University, Computer Science
    • James Binkley., "Authenticated ad hoc routing at the link layer for mobile systems," Technical Report 96-3, Portland State University, Computer Science, 1996.
    • (1996)
    • Binkley, J.1
  • 13
    • 23044520423 scopus 로고    scopus 로고
    • A. Boukerche and Mirela Sechi Moretti Annoni Notare, Neural fraud detection in mobile phone operations, In Proceedings of the IPDPS 2000 Workshops, Cancun, Mexico, pages 636-644, May 1-5 2000.
    • A. Boukerche and Mirela Sechi Moretti Annoni Notare, " Neural fraud detection in mobile phone operations," In Proceedings of the IPDPS 2000 Workshops, Cancun, Mexico, pages 636-644, May 1-5 2000.
  • 14
    • 71249135109 scopus 로고    scopus 로고
    • J. Broch, D. Johnson, and D. Maltz. , The dynamic source routing protocol for mobile adhoc networks, Internet draftdraftietf-manet-dsr-01. txt, December 1998.
    • J. Broch, D. Johnson, and D. Maltz. , " The dynamic source routing protocol for mobile adhoc networks," Internet draftdraftietf-manet-dsr-01. txt, December 1998.
  • 17
    • 0029716418 scopus 로고    scopus 로고
    • S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longsta,A sense of self for Unix processes, In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128,Los Alamitos, CA, 1996. IEEE Computer Society Press.
    • S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longsta,"A sense of self for Unix processes," In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128,Los Alamitos, CA, 1996. IEEE Computer Society Press.
  • 18
    • 0003478316 scopus 로고
    • The architecture of a network level intrusion detection system,
    • Technical report, Computer Science Department, University of New Mexico, August
    • R. Heady, G. Luger, A. Maccabe, and M. Servilla., "The architecture of a network level intrusion detection system," Technical report, Computer Science Department, University of New Mexico, August 1990.
    • (1990)
    • Heady, R.1    Luger, G.2    Maccabe, A.3    Servilla, M.4
  • 19
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras., "State transition analysis: A rule-based intrusion detection approach," IEEE Transactions on Software Engineering, 21(3):181-199,March 1995.
    • (1995) IEEE Transactions on Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 20
    • 71249117309 scopus 로고    scopus 로고
    • S. Jacobs and M. S. Corson , MANET authentication architecture,Internetdraft-jacobs-imep-auth-arch1.txt,expired 2000, February 1999.
    • S. Jacobs and M. S. Corson , "MANET authentication architecture,"Internetdraft-jacobs-imep-auth-arch1.txt,expired 2000, February 1999.
  • 24
    • 0036079805 scopus 로고    scopus 로고
    • P. Lichodzijewski, A., Zincir-Heywood and M. I. Heywood, Host-based intrusion detection using self-organizing maps, In Proceedings of the 2002 IEEE World Congress on Computational Intelligence, 2002 (in press).
    • P. Lichodzijewski, A., Zincir-Heywood and M. I. Heywood, "Host-based intrusion detection using self-organizing maps," In Proceedings of the 2002 IEEE World Congress on Computational Intelligence, 2002 (in press).
  • 26
    • 0031277463 scopus 로고    scopus 로고
    • Distributed learning, recognition, and prediction by ART and ARTMAP neural networks
    • Carpenter, G.A., "Distributed learning, recognition, and prediction by ART and ARTMAP neural networks ," Neural Networks, 10:1473-1494,1997
    • (1997) Neural Networks , vol.10 , pp. 1473-1494
    • Carpenter, G.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.