Intrusion detection techniques for mobile wireless networks

被引:420
作者
Zhang, YG [1 ]
Lee, WK
Huang, YA
机构
[1] HRL Labs LLC, Malibu, CA USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
关键词
intrusion detection; intrusion response; cooperative detection; anomaly detection; mobile ad-hoc networks;
D O I
10.1023/A:1024600519144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.
引用
收藏
页码:545 / 556
页数:12
相关论文
共 27 条
[1]
[Anonymous], 1998, DYNAMIC SOURCE ROUTI
[2]
[Anonymous], 1998, P 7 USENIX SEC S SAN
[3]
[Anonymous], WORKSH MOB COMP SYST
[4]
BINKLEY J, 1996, 963 PORTL STAT U
[5]
Boukerche A, 2000, LECT NOTES COMPUT SC, V1800, P636
[6]
Cohen W. W., 1995, P 12 INT C MACH LEAR, P115, DOI DOI 10.1016/B978-1-55860-377-6.50023-2
[7]
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[8]
FALL K, NS MANUAL 2000
[9]
A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[10]
Heady R.E., 1990, The architecture of a network level intrusion detection system