메뉴 건너뛰기




Volumn , Issue , 2012, Pages 948-953

Proposing a light weight semi-distributed IDS for mobile ad-hoc network based on nodes' mode

Author keywords

attack; intrusion detection; Mobile ad hoc network; neural fuzzy interface; security

Indexed keywords

ATTACK; LIGHT WEIGHT; LOW OVERHEAD; NODE MOVEMENT; PROPOSED ARCHITECTURES; SECURITY; SEMI-DISTRIBUTED;

EID: 84876384633     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISTEL.2012.6483123     Document Type: Conference Paper
Times cited : (4)

References (28)
  • 1
    • 74849118115 scopus 로고    scopus 로고
    • Military tactics in agentbased sinkhole attack detection for wireless ad hoc networks
    • Stefan K. Stafrace, Nick Antonopoulos" Military tactics in agentbased sinkhole attack detection for wireless ad hoc networks" Computer Communications 33 (2010) 619-638
    • (2010) Computer Communications , vol.33 , pp. 619-638
    • Stafrace, S.K.1    Antonopoulos, N.2
  • 3
    • 33845889547 scopus 로고    scopus 로고
    • Detecting unauthorized and compromised nodes in mobile ad-hoc networks
    • April
    • Komninos N.,Vergados D. and Douligeris C., "Detecting Unauthorized and Compromised Nodes in Mobile Ad-Hoc Networks", Journal in Ad Hoc Networks, Elsevier Press, Vol. 5, (3), April 2007, pp. 289-298.
    • (2007) Journal in Ad Hoc Networks, Elsevier Press , vol.5 , Issue.3 , pp. 289-298
    • Komninos, N.1    Vergados, D.2    Douligeris, C.3
  • 4
    • 15844404847 scopus 로고    scopus 로고
    • Secure ad-hoc on-demand distance vector (SAODV)routing
    • October 8
    • M.G. Zapata, "Secure ad-hoc on-demand distance vector (SAODV)routing", IETF MANET Mailing List, October 8, 2001.
    • (2001) IETF MANET Mailing List
    • Zapata, M.G.1
  • 6
    • 24744436723 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y, Lee W, and Huang Y, "Intrusion Detection Techniques for Mobile Wireless Networks", ACM WINET 2003.
    • (2003) ACM WINET
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 9
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • R. Poovendran, L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, ACM Journal on Wireless Networks (WINET), 13 (1) (2007) 27-59
    • (2007) ACM Journal on Wireless Networks (WINET) , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 10
    • 74149089249 scopus 로고    scopus 로고
    • A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
    • Ming-Yang Su " A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks", computer & security29 journal(2010),208-224
    • (2010) Computer & security29 Journal , pp. 208-224
    • Su, M.-Y.1
  • 12
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y.-C. Hu, D.B. Johnson, A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks", WMCSA (2002) 3-13.
    • (2002) WMCSA , pp. 3-13
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 13
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: "a secure on-demand routing protocol for ad hoc networks", MobiCOM (2002) 12-23.
    • (2002) MobiCOM , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 17
    • 77950022458 scopus 로고    scopus 로고
    • A cooperative-sinkhole detection method for rmobile ad hoc networks
    • Gisung Kim?, YounggooHan,SehunKim" A cooperative-sinkhole detection method for rmobile ad hoc networks",in Int. J. Electron. Commun. (AEÜ) 64 (2010) 390-397
    • (2010) Int. J. Electron. Commun. (AEÜ) , vol.64 , pp. 390-397
    • Kim, G.1    Han, Y.2    Kim, S.3
  • 18
    • 53749101677 scopus 로고    scopus 로고
    • LIDF: Layered intrusion detection framework for ad-hoc networks
    • N.Komninos, C.Douligeris, "LIDF: Layered intrusion detection framework for ad-hoc networks", Ad Hoc Networks 7 journal,(2009) 171-181
    • (2009) Ad Hoc Networks 7 Journal , pp. 171-181
    • Komninos, N.1    Douligeris, C.2
  • 21
    • 70349749980 scopus 로고    scopus 로고
    • A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks
    • E.Ayday, F.Fekri, " A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks", journal of Ad Hoc Networks 8 (2010) 181-192
    • (2010) Journal of Ad Hoc Networks , vol.8 , pp. 181-192
    • Ayday, E.1    Fekri, F.2
  • 23
    • 78149465598 scopus 로고    scopus 로고
    • Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
    • Ming-Yang Su, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems", journal of Computer Communications 34 (2011) 107-117
    • (2011) Journal of Computer Communications , vol.34 , pp. 107-117
    • Su, M.-Y.1
  • 24
    • 80053560746 scopus 로고    scopus 로고
    • A hybrid artificial immune system(ais) model for power aware secure mobile ad-hoc networks(manets)routing protocols
    • N. Mazhara,?, M.Farooq" A hybrid artificial immune system(AIS) model for power aware secure Mobile Ad-Hoc Networks(MANETs)routing protocols", Applied Soft Computing xxx (2011) xxx-xxx.
    • (2011) Applied Soft Computing , vol.30
    • Mazhara, N.1    Farooq, M.2
  • 25
    • 39149119287 scopus 로고    scopus 로고
    • Collaborative techniques for intrusion detection in mobile ad-hoc networks
    • N. Marchang, R. Datta" Collaborative techniques for intrusion detection in mobile ad-hoc networks", Ad Hoc Networks 6 (2008) 508-523
    • (2008) Ad Hoc Networks , vol.6 , pp. 508-523
    • Marchang, N.1    Datta, R.2
  • 26
    • 79955571614 scopus 로고    scopus 로고
    • Distributed intrusion detection in the presence of correlated sensor readings: Signal-space and communication-complexity view-point
    • N.E. Venkatesan, Tarun Agarwal, V. Lalitha, P. Vijay Kumar" Distributed intrusion detection in the presence of correlated sensor readings: Signal-space and communication-complexity view-point", Ad Hoc Networks 9 (2011) 1015-1027
    • (2011) Ad Hoc Networks , vol.9 , pp. 1015-1027
    • Venkatesan, N.E.1    Agarwal, T.2    Lalitha, V.3    Vijay Kumar, P.4
  • 27
    • 79251595976 scopus 로고    scopus 로고
    • A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
    • e8 0
    • C.Xenakis, C.Panos, I. Stavrakakis" A comparative evaluation of intrusion detection architectures for mobile ad hoc networks", computers & s e c u rity 3 0 ( 2 0 1 1 ) 6 3 e8 0
    • (2011) Computers & Security , vol.30 , pp. 63
    • Xenakis, C.1    Panos, C.2    Stavrakakis, I.3
  • 28
    • 84876372336 scopus 로고    scopus 로고
    • http://www.cs.Waikato.ac.nz/ml/weka


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.