메뉴 건너뛰기




Volumn 30, Issue 1, 2011, Pages 63-80

A comparative evaluation of intrusion detection architectures for mobile ad hoc networks

Author keywords

IDS architectures; Intrusion detection system; MANETs security; Mobile ad hoc networks; Security attacks; Security vulnerabilities

Indexed keywords

IDS ARCHITECTURES; INTRUSION DETECTION SYSTEM; MANETS SECURITY; SECURITY ATTACKS; SECURITY VULNERABILITIES;

EID: 79251595976     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.10.008     Document Type: Article
Times cited : (51)

References (25)
  • 7
    • 34548591006 scopus 로고    scopus 로고
    • Mobile host-based intrusion detection and attack identification
    • G.A. Jacoby, and N.J. Davis Mobile host-based intrusion detection and attack identification IEEE Wireless Communications 14 4 August 2007 53 60
    • (2007) IEEE Wireless Communications , vol.14 , Issue.4 , pp. 53-60
    • Jacoby, G.A.1    Davis, N.J.2
  • 9
    • 53749101677 scopus 로고    scopus 로고
    • LIDF: Layered intrusion detection framework for ad-hoc networks
    • N. Komninos, and C. Douligeris LIDF: layered intrusion detection framework for ad-hoc networks Ad Hoc Networks 7 1 January 2009 171 182
    • (2009) Ad Hoc Networks , vol.7 , Issue.1 , pp. 171-182
    • Komninos, N.1    Douligeris, C.2
  • 10
    • 72949113634 scopus 로고    scopus 로고
    • A distributed intrusion detection system for resource-constrained devices in ad hoc networks
    • A. Lauf, R.A. Peters, and W.H. Robinson A distributed intrusion detection system for resource-constrained devices in ad hoc networks Ad Hoc Networks 8 3 May 2010 253 266
    • (2010) Ad Hoc Networks , vol.8 , Issue.3 , pp. 253-266
    • Lauf, A.1    Peters, R.A.2    Robinson, W.H.3
  • 14
    • 39149119287 scopus 로고    scopus 로고
    • Collaborative techniques for intrusion detection in mobile ad hoc networks
    • N. Marchang, and R. Datta Collaborative techniques for intrusion detection in mobile ad hoc networks Ad Hoc Networks 6 4 June 2008 508 523
    • (2008) Ad Hoc Networks , vol.6 , Issue.4 , pp. 508-523
    • Marchang, N.1    Datta, R.2
  • 18
    • 53849148915 scopus 로고    scopus 로고
    • FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
    • C. Ramachandran, S. Misra, and M. Obaidat FORK: a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks Elsevier Computer Communications 31 16 October 2008 3855 3869 Performance Evaluation of Communication Networks (SPECTS 2007)
    • (2008) Elsevier Computer Communications , vol.31 , Issue.16 , pp. 3855-3869
    • Ramachandran, C.1    Misra, S.2    Obaidat, M.3
  • 19
    • 46449126324 scopus 로고    scopus 로고
    • Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
    • S.A. Razak, S.M. Furnell, N.L. Clarke, and P.J. Brooke Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks Ad Hoc Networks 6 7 September 2008 1151 1167
    • (2008) Ad Hoc Networks , vol.6 , Issue.7 , pp. 1151-1167
    • Razak, S.A.1    Furnell, S.M.2    Clarke, N.L.3    Brooke, P.J.4
  • 20
    • 78651443538 scopus 로고    scopus 로고
    • Intrusion detection in mobile ad hoc networks
    • S. Sen, and J.A. Clark Intrusion detection in mobile ad hoc networks S. Misra, I. Woungang, S.C. Misra, Guide to wireless ad hoc networks 2009 Springer
    • (2009) Guide to Wireless Ad Hoc Networks
    • Sen, S.1    Clark, J.A.2
  • 22
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • B. Sun, L. Osborne, X. Yang, and S. Guizani Intrusion detection techniques in mobile ad hoc and wireless sensor networks IEEE Wireless Communications 14 5 Oct. 2007 56 63
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1    Osborne, L.2    Yang, X.3    Guizani, S.4
  • 24
    • 74849136546 scopus 로고    scopus 로고
    • A framework for intrusion detection systems by social network analysis methods in ad hoc networks
    • W. Wang, H. Man, and Y. Liu A framework for intrusion detection systems by social network analysis methods in ad hoc networks Wiley Security and Communication Networks 2 6 April, 2009 669 685
    • (2009) Wiley Security and Communication Networks , vol.2 , Issue.6 , pp. 669-685
    • Wang, W.1    Man, H.2    Liu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.