A Heuristic Profile Based Intruder Detection Scheme on MANET
Abstract
Keywords
Full Text:
PDFReferences
Ian D. Chakeres and Elizabeth M. Belding-Royer. "AODV Routing Protocol Implementation Design." Proceedings of the International Workshop on Wireless Ad Hoc Networking (WWAN), Tokyo, Japan, March 2004.
Royer, E.M.; Perkins, C.E., “An implementation study of the AODV routing protocol”, Wireless Communications and Networking Conference (WCNC 2000), IEEE, Volume 3, Issue , pp. 1003 – 1008, 2000.
http://www.isi.edu/nsnam/ns/
J.P. Anderson, “Computer Security Threat Monitoring and Surveillance”. Technical Report, James P.Anderson Co., Fort Washington, PA, April 1980.
D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, Vol. 13, Issue 2, pp. 222-232, February 1987.
Yongguang Zhang, Wenke Lee, and Yian Huang. Intrusion Detection Techniques for Mobile Wireless Network, ACM/ Kluwer Wireless Networks Journal (ACM WINET), Vol. 9, No. 5, pp. 545-56, September 2003.
W. Lee, S. J. Stolfo, and K. W. Mok, “A Data Mining Framework for Building Intrusion Detection Models,” Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 120-132, May 1999.
Yian Huang and Wenke Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), Fairfax, Virginia, October 2003.
Mishra, K. Nadkarni, and A. Patcha, Intrusion Detection in Wireless Ad Hoc Networks, IEEE Wireless Communications, Vol. 11, Issue 1, pp. 48-60, February 2004.
S. Marti, T. Giuli, K. Lai, and M.Baker, “Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks”, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, ACM MobiCom 2000, Boston, MA, pp. 255-265. Aug 2000.
O. Kachirski, and R. Guha, “Intrusion Detection using Mobile Agents in Wireless Ad Hoc Networks,” Proceedings of IEEE Workshop on Knowledge Media Networking, pp. 153-158, 2002.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.