Identifying security threats in ad hoc wireless network

被引:0
|
作者
Hassan, K [1 ]
Conner, M [1 ]
机构
[1] CUNY City Coll, Dept Elect Engn, New York, NY 10003 USA
来源
SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2 | 2003年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc wireless networks are very vulnerable to security threats, therefore it is critical to monitor and identify any encountered security threats immediately. Once a threat is present on the network, an intrusion Detection System (IDS) tries to detect and alert on attempted intrusions into a network. In this paper, a Genetic Algorithm (GA) based adaptive approach is used to exploit IDS provided information for identifying the sources of threats containing probes from an alphabet. The characters in that alphabet, we consider are being generated into the network by a Linear Feedback Shift Register (LFSR). The LFSR is one of the widely used models of pseudo-random number generator (PRNG).
引用
收藏
页码:34 / 38
页数:5
相关论文
共 50 条
  • [31] Geographic messaging in wireless ad hoc network
    Basagni, S
    Chlamtac, I
    Syrotiuk, VR
    1999 IEEE 49TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-3: MOVING INTO A NEW MILLENIUM, 1999, : 1957 - 1961
  • [32] WAIN: Wireless Ad Hoc in Infrastructure Network
    Muthusamy, Yogeswari
    Krishnan, Jaya Kumar
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 2720 - 2725
  • [33] Quality of service for ad hoc wireless network
    Roche, A
    Westphall, CB
    von Mecklenburg, PACKSG
    XXII INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY, PROCEEDINGS, 2002, : 100 - 105
  • [34] Capacity of a Wireless Ad Hoc Network With Infrastructure
    Liu, Benyuan
    Thiran, Patrick
    Towsley, Don
    MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 239 - 246
  • [35] Experimental evaluation of a wireless ad hoc network
    Desilva, S
    Das, SR
    NINTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2000, : 528 - 534
  • [36] Automated testing for cyber threats to ad-hoc wireless networks
    Bergmann, Karel
    Denzinger, Jorg
    2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2014, : 34 - 41
  • [37] Multigrade Security Monitoring for Ad-Hoc Wireless Networks
    Creti, Matthew Tan
    Beaman, Matthew
    Bagchi, Saurabh
    Li, Zhiyuan
    Lu, Yung-Hsiang
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 523 - 533
  • [38] Cluster based security scheme in wireless Ad Hoc networks
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Yanjiu yu Fazhan, 2006, 2 (238-243):
  • [39] Security enhancements in AODV protocol for wireless Ad Hoc Networks
    Bhargava, S
    Agrawal, DP
    IEEE 54TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2001, VOLS 1-4, PROCEEDINGS, 2001, : 2143 - 2147
  • [40] Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications
    Kim, Dong Seong
    Lim, Sunho
    Zhang, Wensheng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,