The Intrusion Detection Model Based on the Fuzzy Judgment in Ad Hoc Network

被引:0
|
作者
Liu Shi-rui [1 ]
Li Zhe [1 ]
机构
[1] Northeastern Univ, Sch Informat Sci & Engn, Shenyang, Peoples R China
关键词
Ad Hoc network; Distributed intrusion detection; Log; Fuzzy judgment; Dynamic classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The problem of security in communication has been researched to Ad Hoc network in this paper, and it also has been proposed a distributed intrusion detection model which is based on the fuzzy judgment. The judging rules of the aggressive behavior are summarized in this model according to the different offensive features in routing layer. Moreover, the log is established according to IP packets in routing layer, and the fuzzy evaluation to the data is carried on. On the base of this, a way to enhance the correct rate of the detection by joint detection mechanism of multi-point cooperation has been introduced in this paper. To distribute the network resource dynamically and reasonably, all nodes are treated dynamically with safety classification. Taking AODV routing protocol as an example, the working mechanism of the model is introduced, and the software NS2 is used to put up network simulation platform. The experimental results show that the detection model can guarantee the network security better.
引用
收藏
页码:2886 / 2889
页数:4
相关论文
共 50 条
  • [1] An intrusion detection model for ad hoc network
    School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
    [J]. Dongbei Daxue Xuebao, 2006, 7 (739-742):
  • [2] Friends mechanism-based routing intrusion detection model for mobile ad hoc network
    Xiao, Yang
    Bai, Lei
    Wang, Xian
    [J]. Tongxin Xuebao/Journal on Communications, 2015, 36
  • [3] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    [J]. MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [4] An intrusion detection architecture for ad hoc network based on artificial immune system
    Xie, Hongxia
    Hui, Zhengyun
    [J]. Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2006, : 1 - 4
  • [5] Data Mining Intrusion Detection in Vehicular Ad Hoc Network
    Liu, Xiaoyun
    Yan, Gongjun
    Rawat, Danda B.
    Deng, Shugang
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (07) : 1719 - 1726
  • [6] Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network
    Liu, Jun
    Chen, Huiting
    Zhen, Zhong
    Sha, Mingbo
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 147 - 154
  • [7] Intrusion Detection System for Wireless Ad-hoc network
    Chandravanshi, Kamlesh
    Tiwari, Akrosh
    Bathre, Mukesh
    [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 272 - +
  • [8] An Intrusion Detection System Model for Ad Hoc Networks Based on the Adjacent Agent
    Zhou, Hua
    Li, Junlin
    Zhao, Na
    Dai, Fei
    Jiang, Rong
    [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 598 - +
  • [9] Fuzzy Based Integrated Security Model for Mobile Ad Hoc Network
    Krishnan, M. B. Mukesh
    Khader, P. Sheik Abdul
    [J]. GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 467 - +
  • [10] Trust System Based Intrusion Detection In Mobile Ad-hoc Network (MANET)
    Nanaware, Pradnya M.
    Babar, Sachin D.
    [J]. 2016 INTERNATIONAL CONFERENCE ON NEXT GENERATION INTELLIGENT SYSTEMS (ICNGIS), 2016, : 283 - 286