Intrusion detection using mobile agent in ad-hoc networks

被引:0
|
作者
Xia, Y [1 ]
Li, RF [1 ]
Li, KL [1 ]
机构
[1] Hunan Univ, Coll Comp & Commun, Key Lab Embedded Syst & Comp, Changsha 410082, Peoples R China
关键词
mobile ad-boc networks; security network; intrusion detection; mobile agent;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security has become an important issue for mobile ad hoe networks especially for the more security-sensitive applications used in military and critical networks. As a positive protection, Intrusion Detection system has been successfully applied in wired networks. However, these correlative researches are not fit for mobile ad hoc networks. This paper puts forward a novel architecture based on mobile agent platform for superior intrusion detection in mobile ad hoc networks. Furthermore, an IDS agent selection algorithm and its security communication mechanism are proposed.
引用
收藏
页码:3383 / 3388
页数:6
相关论文
共 50 条
  • [11] A Behavioural Theory for Intrusion Detection System in Mobile Ad-hoc Networks
    Yadav, Parul
    Gaur, Manish
    [J]. 2018 2ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPILATION, COMPUTING AND COMMUNICATIONS (HP3C 2018), 2018, : 51 - 60
  • [12] Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
    Ponnusamy, Vasaki
    Humayun, Mamoona
    Jhanjhi, N.Z.
    Yichiet, Aun
    Almufareh, Maram Fahhad
    [J]. Computer Systems Science and Engineering, 2021, 40 (03): : 1199 - 1215
  • [13] An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques
    Ganapathy, S.
    Yogesh, P.
    Kannan, A.
    [J]. ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING, 2011, 148 : 117 - 122
  • [14] An agent based intrusion detection model for mobile ad hoc networks
    Reshmi, B. M.
    Manvi, S. S.
    Bhagyavati
    [J]. MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 169 - 191
  • [15] Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks
    Watkins, D
    Scott, C
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 622 - 627
  • [16] Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks
    Cabrera, Joao B. D.
    Gutierrez, Carlos
    Mehra, Raman K.
    [J]. INFORMATION FUSION, 2008, 9 (01) : 96 - 119
  • [17] An efficient intrusion detection in resource-constrained mobile ad-hoc networks
    Bouhaddi, Myria
    Radjef, Mohammed Said
    Adi, Kamel
    [J]. COMPUTERS & SECURITY, 2018, 76 : 156 - 177
  • [18] Agent based connectivity detection and routing in mobile ad-hoc networks
    Hurakadli, J. M.
    Manvi, S. S.
    Mallapur, J. D.
    [J]. 2006 3RD INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2006, : 382 - 386
  • [19] Challenges in intrusion detection for wireless ad-hoc networks
    Brutch, P
    Ko, C
    [J]. 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 368 - 373
  • [20] Using core agent to interconnect mobile Ad-Hoc networks and Internet
    Yao, Yin-Xiong
    Wang, Hao-Xing
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2002, 36 (05): : 665 - 669