메뉴 건너뛰기




Volumn 10, Issue 8, 2011, Pages 1162-1174

On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks

Author keywords

analytical models; false positives; intrusion detection; Mobile ad hoc networks; noise modeling; passive monitoring; performance analysis

Indexed keywords

ANALYTICAL MODEL; FALSE POSITIVES; MOBILE AD HOC; NOISE MODELING; PASSIVE MONITORING; PERFORMANCE ANALYSIS;

EID: 79959520290     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.210     Document Type: Article
Times cited : (28)

References (29)
  • 1
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to byzantine failures
    • Sept.
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures," Proc. ACM WiSe, pp. 21-30, Sept. 2002.
    • (2002) Proc. ACM WiSe , pp. 21-30
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 2
    • 4544308674 scopus 로고    scopus 로고
    • Observation-based cooperation enforcement in ad hoc networks
    • Standford Univ.
    • S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad Hoc Networks," Research Report cs. NI/0307012, Standford Univ., 2003.
    • (2003) Research Report Cs. NI/0307012
    • Bansal, S.1    Baker, M.2
  • 4
    • 33845919346 scopus 로고    scopus 로고
    • Evaluation of a stastical technique to mitigate malicious control packets in ad hoc networks
    • DOI 10.1109/WOWMOM.2006.43, 1648514, Proceedings - WoWMoM 2006: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks
    • R.V. Boppana and S. Desilva, "Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks," Proc. Int'l Symp. World of Wireless Mobile and Multimedia Networks (WoWMoM)/Workshop Advanced Experimental Activities on Wireless Networks and Systems, pp. 559-563, 2006. (Pubitemid 46028700)
    • (2006) Proceedings - WoWMoM 2006: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks , vol.2006 , pp. 559-563
    • Boppana, R.V.1    Desilva, S.2
  • 7
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol: Cooperation of nodes fairness in dynamic ad-hoc networks
    • S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the Confidant Protocol: Cooperation of Nodes Fairness in Dynamic Ad-Hoc Networks," Proc. IEEE/ACM MobiHoc, 2002.
    • (2002) Proc. IEEE/ACM MobiHoc
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 9
    • 0742294233 scopus 로고    scopus 로고
    • Mobile ad hoc networking: Imperatives and challenges
    • DOI 10.1016/S1570-8705(03)00013-1
    • I. Chlamtac, M. Conti, and J.J.-N. Liu, "Mobile Ad Hoc Networking: Imperatives and Challenges," Ad Hoc Networks, vol. 1, no. 1, pp. 13-64, 2003. (Pubitemid 40421395)
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 13-64
    • Chlamtac, I.1    Conti, M.2    Liu, J.J.-N.3
  • 12
    • 34548255006 scopus 로고    scopus 로고
    • Cooperation in mobile ad hoc networks
    • Dept. of Computer Science, Florida State Univ.
    • J. Hu, "Cooperation in Mobile Ad Hoc Networks," Technical Report TR-050111, Dept. of Computer Science, Florida State Univ., 2005.
    • (2005) Technical Report TR-050111
    • Hu, J.1
  • 16
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgement based approach for detection of routing misbehavior in manets
    • May
    • K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgement Based Approach for Detection of Routing Misbehavior in Manets," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6 , Issue.5 , pp. 488-502
    • Liu, K.1    Deng, J.2    Varshney, P.K.3    Balakrishnan, K.4
  • 17
    • 33947624156 scopus 로고    scopus 로고
    • An acknowledgment-based approach for the detection of routing misbehavior in MANETs
    • May
    • K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan, "An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6 , Issue.5 , pp. 488-502
    • Liu, K.1    Deng, J.2    Varshney, P.K.3    Balakrishnan, K.4
  • 21
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • R. Molva and P. Michiardi, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP Comm. and Multimedia Security Conf., 2002.
    • (2002) Proc. IFIP Comm. and Multimedia Security Conf.
    • Molva, R.1    Michiardi, P.2
  • 22
    • 79959507120 scopus 로고    scopus 로고
    • Seattle Wireless Project, http://www.seattlewireless.net, 2010.
    • (2010)
  • 24
    • 77956474272 scopus 로고    scopus 로고
    • Crosscheck mechanism to identify malicious nodes in ad hoc networks
    • X. Su and R.V. Boppana, "Crosscheck Mechanism to Identify Malicious Nodes in Ad Hoc Networks," Security and Comm. Networks, vol. 2, no. 1, pp. 45-54, 2009.
    • (2009) Security and Comm. Networks , vol.2 , Issue.1 , pp. 45-54
    • Su, X.1    Boppana, R.V.2
  • 25
    • 36849062699 scopus 로고    scopus 로고
    • Intrusion detection techniques in mobile ad hoc and wireless sensor networks
    • DOI 10.1109/MWC.2007.4396943
    • B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 56-63, Oct. 2007. (Pubitemid 350231654)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 56-63
    • Sun, B.1    Osborne, L.2    Xiao, Y.3    Guizani, S.4
  • 26
    • 84875379930 scopus 로고    scopus 로고
    • version 7.1.0.183 (R14)
    • The MathWorks Inc., MATLAB, version 7.1.0.183 (R14), http://www. mathworks.com/products/matlab, 2010.
    • (2010) MATLAB
  • 28
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • Feb.
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004.
    • (2004) IEEE Wireless Comm. , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 29
    • 25844465866 scopus 로고    scopus 로고
    • HADOF: Defense against routing disruption in mobile ad hoc networks
    • W. Yu, Y. Sun, and K.J.R. Liu, "HADOF: Defense against Routing Disruption in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Yu, W.1    Sun, Y.2    Liu, K.J.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.