Intrusion Detection Techniques for Mobile Wireless Networks

被引:5
作者
Yongguang Zhang
Wenke Lee
Yi-An Huang
机构
[1] HRL Laboratories LLC,College of Computing
[2] Georgia Institute of Technology,undefined
来源
Wireless Networks | 2003年 / 9卷
关键词
intrusion detection; intrusion response; cooperative detection; anomaly detection; mobile ad-hoc networks;
D O I
暂无
中图分类号
学科分类号
摘要
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.
引用
收藏
页码:545 / 556
页数:11
相关论文
共 9 条
[1]  
Ilgun K.(1995)State transition analysis: A rule-based intrusion detection approach IEEE Transactions on Software Engineering 21 181-199
[2]  
Kemmerer R.A.(1999)The effects of ondemand behavior in routing protocols for multi-hop wireless ad hoc networks IEEE Journal on Selected Areas in Communications 17 1439-1453
[3]  
Porras P.A.(1999)Securing ad hoc networks IEEE Network 13 24-30
[4]  
Maltz D.A.(undefined)undefined undefined undefined undefined-undefined
[5]  
Broch J.(undefined)undefined undefined undefined undefined-undefined
[6]  
Jetcheva J.(undefined)undefined undefined undefined undefined-undefined
[7]  
Johnson D.B.(undefined)undefined undefined undefined undefined-undefined
[8]  
Zhou L.(undefined)undefined undefined undefined undefined-undefined
[9]  
Haas Z.J.(undefined)undefined undefined undefined undefined-undefined