메뉴 건너뛰기




Volumn 8, Issue 3, 2010, Pages 253-266

A distributed intrusion detection system for resource-constrained devices in ad-hoc networks

Author keywords

Ad hoc network; Detection; Embeddable; Embedded; Highlevel Abstraction; Intrusion; Machine learning; Resource constrained; Scalability

Indexed keywords

A-DENSITY; ANOMALY-BASED INTRUSION DETECTION; COMPUTATIONAL REQUIREMENTS; CONNECTED NETWORKS; DISTRIBUTED INTRUSION DETECTION SYSTEMS; EMBEDDABLE; EMBEDDED DEVICE; HIGH-LEVEL ABSTRACTION; INTRUSION DETECTION SYSTEMS; LOCAL MAXIMUM; MACHINE-LEARNING; OFFLINE; OPERATIONAL SCENARIO; POTENTIAL THREATS; RESOURCECONSTRAINED DEVICES; TWO STAGE;

EID: 72949113634     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2009.08.002     Document Type: Article
Times cited : (81)

References (46)
  • 3
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network 13 (1999) 24-30
    • (1999) IEEE Network , vol.13 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 4
    • 57349159239 scopus 로고    scopus 로고
    • Security as a new dimension in embedded system design
    • P. Kocher, et al., Security as a new dimension in embedded system design, in: 41st Design Automation Conference, 2004.
    • (2004) 41st Design Automation Conference
    • Kocher, P.1
  • 5
    • 33847735919 scopus 로고    scopus 로고
    • Quantum computing is exciting and important-really!
    • p. 104
    • Day C. Quantum computing is exciting and important-really!. Computing in Science and Engineering 9 2 (2007) p. 104
    • (2007) Computing in Science and Engineering , vol.9 , Issue.2
    • Day, C.1
  • 6
    • 11944271788 scopus 로고    scopus 로고
    • DVD copy protection: take 2
    • Perry T.S. DVD copy protection: take 2. IEEE Spectrum 42 1 (2005) 38-39
    • (2005) IEEE Spectrum , vol.42 , Issue.1 , pp. 38-39
    • Perry, T.S.1
  • 8
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: existing solutions and latest technological trends
    • Patcha A., and Park J.-M. An overview of anomaly detection techniques: existing solutions and latest technological trends. Computer Networks 51 12 (2007) 3448-3470
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 10
    • 36849010124 scopus 로고    scopus 로고
    • A Survey on attacks and countermeasures in mobile ad hoc networks
    • Xiao X.S.Y., and Du D.-Z. (Eds), Springer
    • Wu B., et al. A Survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao X.S.Y., and Du D.-Z. (Eds). Wireless/Mobile Network Security (2006), Springer
    • (2006) Wireless/Mobile Network Security
    • Wu, B.1
  • 11
    • 39749195430 scopus 로고    scopus 로고
    • Analysis of payload based application level network anomaly detection
    • Hawaii International Conference on System Sciences, HICSS 2007
    • Z. Like, B.W. Gregory, Analysis of payload based application level network anomaly detection, in: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007.
    • 40th Annual
    • Like, Z.1    Gregory, B.W.2
  • 13
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y., Lee W., and Huang Y.-A. Intrusion detection techniques for mobile wireless networks. Wireless Networks 9 5 (2003)
    • (2003) Wireless Networks , vol.9 , Issue.5
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3
  • 15
    • 24744455037 scopus 로고    scopus 로고
    • Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data
    • A. Yamada, et al., Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data, in: International Conference on Information Technology: Coding and Computing, ITCC, 2005.
    • (2005) International Conference on Information Technology: Coding and Computing, ITCC
    • Yamada, A.1
  • 16
    • 16244397709 scopus 로고    scopus 로고
    • C. Daskalakis, P. Martone, Alternative surveillance technology for the Gulf of Mexico, in: The 23rd Digital Avionics Systems Conference, DASC 04, 2004.
    • C. Daskalakis, P. Martone, Alternative surveillance technology for the Gulf of Mexico, in: The 23rd Digital Avionics Systems Conference, DASC 04, 2004.
  • 19
    • 19244367964 scopus 로고    scopus 로고
    • Testing of traffic information service broadcast (TIS-B) and ADS-B at Memphis International Airport
    • R. Nichols, et al. Testing of traffic information service broadcast (TIS-B) and ADS-B at Memphis International Airport, in: The 21st Digital Avionics Systems Conference, 2002.
    • (2002) The 21st Digital Avionics Systems Conference
    • Nichols, R.1
  • 20
    • 72949114126 scopus 로고    scopus 로고
    • Swarming for Success, in: Astrobiology Magazine. NASA Ames., 2005.
    • Swarming for Success, in: Astrobiology Magazine. NASA Ames., 2005.
  • 23
    • 33845882200 scopus 로고    scopus 로고
    • Z. Xiaoqiang, Z. Zhongliang, F. Pingzhi, Intrusion detection based on cross-correlation of system call sequences, in: 17th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 05, 2005.
    • Z. Xiaoqiang, Z. Zhongliang, F. Pingzhi, Intrusion detection based on cross-correlation of system call sequences, in: 17th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 05, 2005.
  • 24
    • 33847144165 scopus 로고    scopus 로고
    • Artificial intelligence techniques applied to intrusion detection
    • N.B. Idris, B. Shanmugam, Artificial intelligence techniques applied to intrusion detection, in: INDICON2005, 2005.
    • (2005) INDICON2005
    • Idris, N.B.1    Shanmugam, B.2
  • 28
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile ad hoc networks by reputation systems
    • S. Buchegger, J.Y. Le Boudec, Self-policing mobile ad hoc networks by reputation systems, in: IEEE Communications Magazine, 2005, pp. 101-107.
    • (2005) IEEE Communications Magazine , pp. 101-107
    • Buchegger, S.1    Le Boudec, J.Y.2
  • 30
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile ad hoc networks by reputation systems
    • Buchegger S., and Le Boudee J.Y. Self-policing mobile ad hoc networks by reputation systems. Communications Magazine IEEE 43 7 (2005) 101-107
    • (2005) Communications Magazine IEEE , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Le Boudee, J.Y.2
  • 36
    • 53749101677 scopus 로고    scopus 로고
    • LIDF: layered intrusion detection framework for ad hoc networks
    • Komninos N., and Douligeris C. LIDF: layered intrusion detection framework for ad hoc networks. Ad Hoc Networks 7 (2009) 171-182
    • (2009) Ad Hoc Networks , vol.7 , pp. 171-182
    • Komninos, N.1    Douligeris, C.2
  • 37
    • 33845889547 scopus 로고    scopus 로고
    • Detecting unauthorized and compromised nodes in mobile ad hoc networks
    • Komninos N., Vergados D., and Douligeris C. Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks 5 (2007) 289-298
    • (2007) Ad Hoc Networks , vol.5 , pp. 289-298
    • Komninos, N.1    Vergados, D.2    Douligeris, C.3
  • 38
    • 39149119287 scopus 로고    scopus 로고
    • Collaborative techniques for intrusion detection in mobile ad hoc networks
    • in press
    • N. Marchang, R. Datta, Collaborative techniques for intrusion detection in mobile ad hoc networks. Ad Hoc Networks, in press.
    • Ad Hoc Networks
    • Marchang, N.1    Datta, R.2
  • 42
    • 46449126324 scopus 로고    scopus 로고
    • Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
    • Razak S.A., Furnell S.M., Clarke N.L., and Brooke P.J. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6 (2008) 1151-1167
    • (2008) Ad Hoc Networks , vol.6 , pp. 1151-1167
    • Razak, S.A.1    Furnell, S.M.2    Clarke, N.L.3    Brooke, P.J.4
  • 44
    • 34247527847 scopus 로고    scopus 로고
    • W. Xia, Intrusion detection techniques in wireless ad hoc networks, in: 30th Annual International Computer Software and Applications Conference, COMPSAC '06, 2006
    • W. Xia, Intrusion detection techniques in wireless ad hoc networks, in: 30th Annual International Computer Software and Applications Conference, COMPSAC '06, 2006.
  • 45
    • 34548323745 scopus 로고    scopus 로고
    • Attack analysis and detection for ad hoc routing protocols
    • Springer, Berlin/Heidelberg
    • Huang Y.-A., and Lee W. Attack analysis and detection for ad hoc routing protocols. Recent Advances in Intrusion Detection (2004), Springer, Berlin/Heidelberg 125-145
    • (2004) Recent Advances in Intrusion Detection , pp. 125-145
    • Huang, Y.-A.1    Lee, W.2
  • 46
    • 72949098874 scopus 로고    scopus 로고
    • Generic Modeling Environment, 2000-2007, Vanderbilt University, Nashville.
    • Generic Modeling Environment, 2000-2007, Vanderbilt University, Nashville.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.