메뉴 건너뛰기




Volumn 220, Issue , 2013, Pages 580-602

Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks

Author keywords

Anomaly detection; Link delay; Mobile ad hoc network; Self organizing Map

Indexed keywords

ANOMALY DETECTION; DELAY DISTRIBUTIONS; DESIGN APPROACHES; DESIGN SCHEME; END-TO-END MEASUREMENT; ENERGY AWARE; LINK DELAY; LINK PERFORMANCE; MALICIOUS NODES; NETWORK OVERLOADS; NETWORK RESOURCE; NETWORK TOMOGRAPHY; NETWORK TOPOLOGY; PERFORMANCE DEGRADATION; RESOURCE-CONSTRAINED; SECURITY SERVICES; SELF-ADAPTIVE; SELF-ORGANIZING MAP NEURAL NETWORK; SYSTEM SERVICES;

EID: 84868459029     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2012.07.036     Document Type: Conference Paper
Times cited : (25)

References (61)
  • 2
    • 0043035691 scopus 로고    scopus 로고
    • Direct measurement vs. indirect inference for determining network internal delays
    • K.G. Anagnostakis, and M.B. Greenwald Direct measurement vs. indirect inference for determining network internal delays Performance Evaluation 49 2002 165 176
    • (2002) Performance Evaluation , vol.49 , pp. 165-176
    • Anagnostakis, K.G.1    Greenwald, M.B.2
  • 4
    • 84868474073 scopus 로고    scopus 로고
    • Performance of Security Mechanisms in Wireless Ad Hoc Networks
    • W.W. Smari, (Ed.) Nicosia, Cyprus
    • M. Becker, M. Drozda, S. Schaust, Performance of Security Mechanisms in Wireless Ad Hoc Networks, In: W.W. Smari, (Ed.), 22nd EUROPEAN Conference on Modelling and Simulation, Nicosia, Cyprus, 2008, pp. 1-6.
    • (2008) 22nd EUROPEAN Conference on Modelling and Simulation , pp. 1-6
    • Becker, M.1    Drozda, M.2    Schaust, S.3
  • 6
    • 79959520290 scopus 로고    scopus 로고
    • On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks
    • R.V. Boppana, and X. Su On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks IEEE Transactions on Mobile Computing 10 2011 1162 1174
    • (2011) IEEE Transactions on Mobile Computing , vol.10 , pp. 1162-1174
    • Boppana, R.V.1    Su, X.2
  • 7
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad hoc and sensor networks
    • A. Boukerch, L. Xu, and K. EL-Khatib Trust-based security for wireless ad hoc and sensor networks Computer Communications 30 2007 2413 2427
    • (2007) Computer Communications , vol.30 , pp. 2413-2427
    • Boukerch, A.1    Xu, L.2    El-Khatib, K.3
  • 9
    • 58049119197 scopus 로고    scopus 로고
    • A simple graphical approach for understanding probabilistic inference in Bayesian networks
    • C.J. Butz, S. Hua, J. Chen, and H. Yao A simple graphical approach for understanding probabilistic inference in Bayesian networks Information Sciences 179 2009 699 716
    • (2009) Information Sciences , vol.179 , pp. 699-716
    • Butz, C.J.1    Hua, S.2    Chen, J.3    Yao, H.4
  • 11
    • 84855456018 scopus 로고    scopus 로고
    • On improving temporal and spatial mobility metrics for wireless ad hoc networks
    • E.R. Cavalcanti, and M.A. Spohn On improving temporal and spatial mobility metrics for wireless ad hoc networks Information Sciences 188 2012 182 197
    • (2012) Information Sciences , vol.188 , pp. 182-197
    • Cavalcanti, E.R.1    Spohn, M.A.2
  • 12
    • 58149523732 scopus 로고    scopus 로고
    • AdHoc Probe: End-to-end capacity probing in wireless ad hoc networks
    • L.J. Chen, T. Sun, G. Yang, M.Y. Sanadidi, and M. Gerla AdHoc Probe: end-to-end capacity probing in wireless ad hoc networks Wireless Networks 15 2009 111 126
    • (2009) Wireless Networks , vol.15 , pp. 111-126
    • Chen, L.J.1    Sun, T.2    Yang, G.3    Sanadidi, M.Y.4    Gerla, M.5
  • 13
    • 17144408406 scopus 로고    scopus 로고
    • Balancing security against performance in wireless ad hoc and sensor networks
    • September
    • C. Chigan, Y. Ye, L. Li, Balancing security against performance in wireless ad hoc and sensor networks, in: Proceedings of IEEE VTC 2004, vol. 7, September 2004, pp. 4735-4739.
    • (2004) Proceedings of IEEE VTC 2004 , vol.7 , pp. 4735-4739
    • Chigan, C.1    Ye, Y.2    Li, L.3
  • 21
    • 0036670170 scopus 로고    scopus 로고
    • Mobility increases the capacity of ad hoc wireless networks
    • M. Grossglauser, and D. Tse Mobility increases the capacity of ad hoc wireless networks ACM/IEEE Trans. Network 10 2002 477 486
    • (2002) ACM/IEEE Trans. Network , vol.10 , pp. 477-486
    • Grossglauser, M.1    Tse, D.2
  • 23
    • 84868478945 scopus 로고    scopus 로고
    • Self-organization map and its application
    • T. Heizo, and F. Kikuro Self-organization map and its application Brain & Neural Networks 10 2003 147 157
    • (2003) Brain & Neural Networks , vol.10 , pp. 147-157
    • Heizo, T.1    Kikuro, F.2
  • 26
    • 70350560758 scopus 로고    scopus 로고
    • A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks
    • IEEE Computer Society Wuhan, China
    • L. Huike, and G. Daquan A novel intrusion detection scheme using support vector machine fuzzy network for mobile ad hoc networks Proc. The Second Pacific-Asia Conference on Web Mining and Web-based Application 2009 IEEE Computer Society Wuhan, China 47 50
    • (2009) Proc. the Second Pacific-Asia Conference on Web Mining and Web-based Application , pp. 47-50
    • Huike, L.1    Daquan, G.2
  • 27
    • 38049032984 scopus 로고    scopus 로고
    • Architecture for data collection in database intrusion detection systems
    • X. Jin, and S.L. Osborn Architecture for data collection in database intrusion detection systems Lecture Notes in Computer Science 4721 2007 96 107
    • (2007) Lecture Notes in Computer Science , vol.4721 , pp. 96-107
    • Jin, X.1    Osborn, S.L.2
  • 30
    • 48749127817 scopus 로고    scopus 로고
    • Local anomaly detection for mobile network monitoring
    • P. Kumpulainen, and Kimmo Hatonen Local anomaly detection for mobile network monitoring Information Sciences 178 2008 3840 3859
    • (2008) Information Sciences , vol.178 , pp. 3840-3859
    • Kumpulainen, P.1    Hatonen, K.2
  • 34
    • 84967496010 scopus 로고    scopus 로고
    • Network tomography: A review and recent developments
    • Fan Koul Imperial College Press London
    • E. Lawrence, G. Michailidis, V.N. Nair, and X. Bowei Network tomography: a review and recent developments Fan Koul Frontiers in Statistics 2006 Imperial College Press London 345 366
    • (2006) Frontiers in Statistics , pp. 345-366
    • Lawrence, E.1    Michailidis, G.2    Nair, V.N.3    Bowei, X.4
  • 35
    • 80052938422 scopus 로고    scopus 로고
    • A lightweight anonymous routing protocol without public key for wireless ad hoc networks
    • C.T. Li, and M.S. Hwang A lightweight anonymous routing protocol without public key for wireless ad hoc networks Information Sciences 181 2011 5333 5347
    • (2011) Information Sciences , vol.181 , pp. 5333-5347
    • Li, C.T.1    Hwang, M.S.2
  • 37
    • 0041663418 scopus 로고    scopus 로고
    • Unicast-based inference of network link delay distributions with finite mixture models
    • S. Meng-Fu, and O. Alfred Unicast-based inference of network link delay distributions with finite mixture models IEEE Transactions on Signal Processing 51 2003 2219 2228
    • (2003) IEEE Transactions on Signal Processing , vol.51 , pp. 2219-2228
    • Meng-Fu, S.1    Alfred, O.2
  • 38
    • 84868500354 scopus 로고    scopus 로고
    • Active network tomography and the design of efficient probing experiments
    • Santa Fe, NM
    • D. Michailidis, V.N. Nair, Active network tomography and the design of efficient probing experiments, in: Mathematical Methods in Reliability Conference, Santa Fe, NM, 2004, pp. 137-141.
    • (2004) Mathematical Methods in Reliability Conference , pp. 137-141
    • Michailidis, D.1    Nair, V.N.2
  • 43
    • 36448978463 scopus 로고    scopus 로고
    • Passive tomography of a 3G network: Challenges and opportunities
    • F. Ricciato, F. Vacirca, W. Fleischer, J. Motz, M. Rupp, Passive tomography of a 3G network: challenges and opportunities, in: INFOCOM 2006, 2006, pp. 116-122.
    • (2006) INFOCOM 2006 , pp. 116-122
    • Ricciato, F.1    Vacirca, F.2    Fleischer, W.3    Motz, J.4    Rupp, M.5
  • 44
    • 35048812446 scopus 로고    scopus 로고
    • A clock synchronization algorithm for multihop wireless ad hoc networks
    • J.P. Sheu, C.M. Chao, W.K. Hu, and C.W. Sun A clock synchronization algorithm for multihop wireless ad hoc networks Wireless Personal Communications 43 2006 185 200
    • (2006) Wireless Personal Communications , vol.43 , pp. 185-200
    • Sheu, J.P.1    Chao, C.M.2    Hu, W.K.3    Sun, C.W.4
  • 50
    • 78649400157 scopus 로고    scopus 로고
    • Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption
    • S. Umang, B.V.R. Reddy, and M.N. Hoda Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption IET Communications 4 2010 2084 2094
    • (2010) IET Communications , vol.4 , pp. 2084-2094
    • Umang, S.1    Reddy, B.V.R.2    Hoda, M.N.3
  • 51
    • 0001073106 scopus 로고    scopus 로고
    • Network tomography: Estimating source-destination traffic intensities from link data
    • Y. Vardi Network tomography: estimating source-destination traffic intensities from link data Journal of the American Statistical Association 91 1996 365 377
    • (1996) Journal of the American Statistical Association , vol.91 , pp. 365-377
    • Vardi, Y.1
  • 55
    • 70449112645 scopus 로고    scopus 로고
    • A novel mobility model based on semi-random circular movement in mobile ad hoc networks
    • W. Wang, X. Guan, B. Wang, and Y. Wang A novel mobility model based on semi-random circular movement in mobile ad hoc networks Information Sciences 180 2010 399 413
    • (2010) Information Sciences , vol.180 , pp. 399-413
    • Wang, W.1    Guan, X.2    Wang, B.3    Wang, Y.4
  • 56
    • 79251595976 scopus 로고    scopus 로고
    • A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
    • C. Xenakis, C. Panos, and I. Stavrakakis A comparative evaluation of intrusion detection architectures for mobile ad hoc networks Computers & Security 30 2011 63 80
    • (2011) Computers & Security , vol.30 , pp. 63-80
    • Xenakis, C.1    Panos, C.2    Stavrakakis, I.3
  • 58
    • 78651590884 scopus 로고    scopus 로고
    • Ad hoc network measurement based on network tomography: Theory, technique, and application
    • Y. Yao, and W. Cai Ad hoc network measurement based on network tomography: theory, technique, and application Journal of Networks 5 2010 666 674
    • (2010) Journal of Networks , vol.5 , pp. 666-674
    • Yao, Y.1    Cai, W.2
  • 60
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Y. Zhang, W. Lee, Intrusion detection in wireless ad hoc networks, in: Proc. of the MOBICOM 2000, ACM, 2000, pp. 275-283.
    • (2000) Proc. of the MOBICOM 2000, ACM , pp. 275-283
    • Zhang, Y.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.