Intrusion detection using mobile agent in ad-hoc networks

被引:0
|
作者
Xia, Y [1 ]
Li, RF [1 ]
Li, KL [1 ]
机构
[1] Hunan Univ, Coll Comp & Commun, Key Lab Embedded Syst & Comp, Changsha 410082, Peoples R China
关键词
mobile ad-boc networks; security network; intrusion detection; mobile agent;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security has become an important issue for mobile ad hoe networks especially for the more security-sensitive applications used in military and critical networks. As a positive protection, Intrusion Detection system has been successfully applied in wired networks. However, these correlative researches are not fit for mobile ad hoc networks. This paper puts forward a novel architecture based on mobile agent platform for superior intrusion detection in mobile ad hoc networks. Furthermore, an IDS agent selection algorithm and its security communication mechanism are proposed.
引用
收藏
页码:3383 / 3388
页数:6
相关论文
共 50 条
  • [1] Intrusion detection in mobile ad-hoc networks: A mobile agent approach
    Kaur, Upinder
    Patel, R. B.
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 77 - +
  • [2] Agent-based immunological intrusion detection system for Mobile Ad-hoc Networks
    Byrski, Aleksander
    Carvalho, Marco
    [J]. COMPUTATIONAL SCIENCE - ICCS 2008, PT 3, 2008, 5103 : 584 - +
  • [3] A Study on Intrusion Detection System of Mobile Ad-hoc Networks
    Sindhuja, S.
    Vadivel, R.
    [J]. SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 307 - 316
  • [4] A Survey of Intrusion Detection Systems for Mobile Ad-Hoc Networks
    Alriyami, Qasim M.
    Asimakopoulou, Eleana
    Bessis, Nik
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 427 - 432
  • [5] Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
    Vetrichelvi
    Rajaram
    Vanitha
    Mohankumar, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (09): : 215 - 219
  • [6] Collaborative techniques for intrusion detection in mobile ad-hoc networks
    Marchang, Ningrinla
    Datta, Raja
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 508 - 523
  • [7] Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
    Cretu, Gabriela F.
    Parekh, Janak J.
    Wang, Ke
    Stolfo, Salvatore J.
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 635 - 639
  • [8] Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
    Ponnusamy, Vasaki
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Yichiet, Aun
    Almufareh, Maram Fahhad
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 1199 - 1215
  • [9] Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushanta
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2016, 19 (02): : 782 - 799
  • [10] A Behavioural Theory for Intrusion Detection System in Mobile Ad-hoc Networks
    Yadav, Parul
    Gaur, Manish
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPILATION, COMPUTING AND COMMUNICATIONS (HP3C 2018), 2018, : 51 - 60