浏览全部资源
扫码关注微信
西安电子科技大学 通信工程学院,陕西 西安 710071
[ "肖阳(1991-),男,新疆石河子人,西安电子科技大学博士生,主要方向为信任管理、可信计算。" ]
[ "白磊(1993-),男,河南漯河人,西安电子科技大学硕士生,主要研究方向为网络与信息安全、无线传感器网络。" ]
[ "王仙(1987-),女,陕西富平人,西安电子科技大学硕士生,主要研究方向为网络安全防御及检测、网络攻防等。" ]
网络出版日期:2015-11,
纸质出版日期:2015-11-25
移动端阅览
肖阳, 白磊, 王仙. 基于朋友机制的移动ad hoc网络路由入侵检测模型研究[J]. 通信学报, 2015,36(Z1):203-214.
Yang XIAO, Lei BAI, Xian WANG. Friends mechanism-based routing intrusion detection model for mobile ad hoc network[J]. Journal on communications, 2015, 36(Z1): 203-214.
肖阳, 白磊, 王仙. 基于朋友机制的移动ad hoc网络路由入侵检测模型研究[J]. 通信学报, 2015,36(Z1):203-214. DOI: 10.11959/j.issn.1000-436x.2015301.
Yang XIAO, Lei BAI, Xian WANG. Friends mechanism-based routing intrusion detection model for mobile ad hoc network[J]. Journal on communications, 2015, 36(Z1): 203-214. DOI: 10.11959/j.issn.1000-436x.2015301.
从如何有效检测移动ad hoc网络路由入侵行为、如何准确地响应并将恶意路由节点移除网络,提供可信路由环境的角度进行分析,提出了一种基于朋友机制的轻量级移动ad hoc网络入侵检测模型,并以典型的黑洞攻击为例,通过OPNET网络建模仿真及实验分析,验证了该模型的可行性和有效性。
The proposed model mainly focused on how to effectively detect routing invasions from mobile ad hoc network as well as how to accurately respond to the malicious nodes
providing a trusted routing environment.A lightweight intrusion detection model was proposed to based on the friends mechanism
taking black hole attack for example
the OPNET software gives the simulation test
and results show that the schemes can effectively detect attacks
it is validated and compared with other conventional models.
YANG C T , et al . A specification-based intrusion detection system for AODV [A ] . Proc of the ACM Workshop on security of Ad Hoc and SensorNetworks [C ] . 2003 . 125 - 134 .
HUANG Y , FAN W , LEE W , et al . Cross-featurea nalysisf or detecting ad-hoc routing anomalies [A ] . Proceedings of the 23rd Intemational Conference On Distributed Computing Systems [C ] . 2003 . 478 - 487 .
SRINIVASARAO G , KUMAR S S . An Efficient Intrusion Detection System in Mobile Ad hoc Networks [A ] . Lecture Notes in Electrical Engineering 151 [C ] . 2013 .
KULKARNI P . Design of hierarchical intrusion detection unit for ad hoc networks based on bayesian networks [M ] . Dissertations & These grad works , 2008 .
PERRIG A , ZAPATA , JOHNSON D B . Ariadne:a secure on-demand routing protocol for ad hoc networks [A ] . Mobile Computing and Networking ACM [C ] . 2002 . 12 - 23 .
JOHN C E . Fast training of support vector machines using sequential minimal optimization [M ] . Advances in Kernel Methods Support Vector Learning,Cambridge,MA,M/T Press , 1999 : 185 - 208 .
KEERTHI S S , SHEVADE S K , BHATTACHARYYA C , et al . Improvements to Platt’s SM4 algorithm for SVM classifier design [D ] . Dept.of O Mechanical and Production Engineering,National University of Singapore , 1999 .
JOACHIMS T . Making Large-Scale SVM Learning Practical [R ] . LS8Report,University of Dortmund , 1998 .
CHANG C C , LIN C J . LIBSVM:a library for support vector machines [EB/OL ] . http://www.csie.ntu.edu.tw/.rcjlinhibsvm http://www.csie.ntu.edu.tw/.rcjlinhibsvm , 2001 .
MILGRAM S . The small world problem [J ] . Psychology Today , 1967 ,( 5 ): 60 - 67 .
HELMY A . Small worlds in wireless networks [J ] . IEEE Communications Letters , 2003 , 7 ( 10 ): 490 - 492 .
CAPKUN S , HUBAUX J P , BUTTYAN L . Mobility helps security in ad hoc networks [A ] . Proc of MobiHoc’03,Annapolis [C ] . 2003 . 45 - 56 .
PEI W D , CHEN Z Q , YUAN Z Z . Friends-help mechanism for generating a class of scale-free networks [J ] . Journal of Jilin University (Information Science Edition) 2007 , 25 ( 4 ): 371 - 378 .
MA C E SHI H S . Security model and mathematical analysis of mobile ad hoc network [J ] . Chinese Journal of Sensors and Actuators , 2006 , 19 ( 4 ): 1305 - 1309 .
RAGHAVAN B , SNOEREN A C . Priority forwarding in ad hoc networks with self-interested parties [A ] . Workshop on Economics of Peer-to-Peer Systems [C ] . Berkeley,USA,May , 2003 .
MIRANDA H , RODRIGUES L . Friends and foes:preventing selfishness in open mobile ad hoc networks [A ] . Proc of the First International Workshop on Mobile Distributed Computing (MDC’03) [C ] . USA , 2003 .
VAPNIK V N . The nature of statistical learning theory [A ] . Series:Information Science and Statistics [C ] . 1996 .
RAZAK S A , FURNELL S , CLARKE N , et al . A two-tier intrusion detection system for mobile ad hoc networks–a friend approach [A ] . Intelligence and Security Informatics [C ] . Springer Berlin Heidelberg , 2006 . 590 - 595 .
DENG H M , ZENG Q A , AGRAWAL D P . SVM-based intrusion detection system for wireless ad hoc networks [A ] . Vehicular Technology Conference [C ] . 2003 .
WANG X ; WONG J S , STANLEY F , BASU S . Cross-layer based anomaly detection in wireless mesh networks [A ] . Ninth Annual International Symposium on Applications and the Internet [C ] . 2009 . 20 - 24 .
0
浏览量
2278
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构