Intrusion Detection Techniques for Mobile Wireless Networks

被引:5
|
作者
Yongguang Zhang
Wenke Lee
Yi-An Huang
机构
[1] HRL Laboratories LLC,College of Computing
[2] Georgia Institute of Technology,undefined
来源
Wireless Networks | 2003年 / 9卷
关键词
intrusion detection; intrusion response; cooperative detection; anomaly detection; mobile ad-hoc networks;
D O I
暂无
中图分类号
学科分类号
摘要
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.
引用
收藏
页码:545 / 556
页数:11
相关论文
共 50 条
  • [1] Intrusion detection techniques for mobile wireless networks
    Zhang, YG
    Lee, WK
    Huang, YA
    WIRELESS NETWORKS, 2003, 9 (05) : 545 - 556
  • [2] Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
    Sun, Bo
    Osborne, Lawrence
    Xiao, Yang
    Guizani, Sghaier
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 56 - 63
  • [3] Analysis of anomaly-based intrusion detection techniques for mobile wireless networks
    Liu, Lijun
    Ma, Hongxia
    Liu, Jianqiu
    Li, Zhuowei
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 827 - 832
  • [4] Intrusion detection techniques in wireless ad hoc networks
    Wang, Xia
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 347 - 349
  • [5] Using mobile agents for intrusion detection in wireless ad hoc networks
    Hijazi, A
    Nasser, N
    2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 362 - 366
  • [6] Intrusion detection using mobile agents in wireless ad hoc networks
    Kachirski, O
    Guha, R
    IEEE WORKSHOP ON KNOWLEDGE MEDIA NETWORKING, PROCEEDINGS, 2002, : 153 - 158
  • [7] Study and Analysis of Various Intrusion Detection Techniques in Wireless Sensor Networks
    Putty, Srividya
    Lavadya, Nirmala Devi
    Rao, Nageswar A.
    2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [8] Intrusion detection in wireless networks using clustering techniques with expert analysis
    Khoshgoftaar, TM
    Nath, SV
    Zhong, S
    Seliya, N
    ICMLA 2005: FOURTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, PROCEEDINGS, 2005, : 120 - 125
  • [9] Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Romano, Luigi
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 247 - 254
  • [10] Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
    Sen, Sevil
    Clark, John A.
    COMPUTER NETWORKS, 2011, 55 (15) : 3441 - 3457