Research on Intrusion Detection Technique of Mobile Ad Hoc Network Security

被引:0
作者
Sun, Huafeng [1 ]
机构
[1] Tianjin Vocat Inst, Tianjin, Peoples R China
来源
MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4 | 2013年 / 694-697卷
关键词
Mobile Ad Hoc networks; IDS; Agent; Anomaly detection; Transport protocol;
D O I
10.4028/www.scientific.net/AMR.694-697.2483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By analyzing the characteristics of the existing intrusion detection techniques and limitations of network anomaly detection method is proposed. According to TCP/IP protocol packet structure characteristics, the behavior of a new notation, the definition of data packets through the network characteristics of the user's behavior to make up for past acts of intrusion detection system that is incomplete and non-real-time inadequate.
引用
收藏
页码:2483 / 2488
页数:6
相关论文
共 16 条
[1]   Intrusion detection in sensor networks: A non-cooperative game approach [J].
Agah, A ;
Das, SK ;
Basu, K ;
Asadi, M .
THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, :343-346
[2]   Security issues in wireless ad hoc networks and the application to the telecare project [J].
Aziz, M. ;
Al-Akaidi, M. .
PROCEEDINGS OF THE 2007 15TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING, 2007, :491-+
[3]  
Feng H. W., 2006, VEH TECHN C MONTR CA, P742
[4]   Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network [J].
Feng, Li ;
Li, Zili ;
Zhang, Yi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (04) :781-787
[5]   The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors [J].
Joo, D ;
Hong, T ;
Han, I .
EXPERT SYSTEMS WITH APPLICATIONS, 2003, 25 (01) :69-75
[6]   Intrusion detection using mobile agents in wireless ad hoc networks [J].
Kachirski, O ;
Guha, R .
IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, :153-158
[7]  
Kachirski O., 2003, 36 INT C SYST SCI HA, P57
[8]   An ant colony optimization routing based on robustness for ad hoc networks with GPSs [J].
Kadono, Daisuke ;
Izumi, Tomoko ;
Ooshita, Fukuhito ;
Kakugawa, Hirotsugu ;
Masuzawa, Toshimitsu .
AD HOC NETWORKS, 2010, 8 (01) :63-76
[9]  
LUNT TF, 1988, SRICSL8812
[10]   Collaborative techniques for intrusion detection in mobile ad-hoc networks [J].
Marchang, Ningrinla ;
Datta, Raja .
AD HOC NETWORKS, 2008, 6 (04) :508-523