Intrusion Detection Techniques for Mobile Wireless Networks

被引:5
|
作者
Yongguang Zhang
Wenke Lee
Yi-An Huang
机构
[1] HRL Laboratories LLC,College of Computing
[2] Georgia Institute of Technology,undefined
来源
Wireless Networks | 2003年 / 9卷
关键词
intrusion detection; intrusion response; cooperative detection; anomaly detection; mobile ad-hoc networks;
D O I
暂无
中图分类号
学科分类号
摘要
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.
引用
收藏
页码:545 / 556
页数:11
相关论文
共 50 条
  • [41] IDAMN: An intrusion detection architecture for mobile networks
    Samfat, D
    Molva, R
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1997, 15 (07) : 1373 - 1380
  • [42] Wireless Intrusion and Attack Detection for 5G Networks using Deep Learning Techniques
    Alenazi, Bayana
    Idris, Hala Eldaw
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 851 - 856
  • [43] An Intelligent Intrusion Detection System for Mobile Ad-Hoc Networks Using Classification Techniques
    Ganapathy, S.
    Yogesh, P.
    Kannan, A.
    ADVANCES IN POWER ELECTRONICS AND INSTRUMENTATION ENGINEERING, 2011, 148 : 117 - 122
  • [44] Fault-intrusion tolerant techniques in wireless sensor networks
    Ma, Ruiping
    Xing, Liudong
    Michel, Howard E.
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 85 - +
  • [45] Intrusion Detection and Security Mechanisms for Wireless Sensor Networks
    Khan, S.
    Lloret, Jaime
    Loo, Jonathan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [46] SID: Ship Intrusion Detection with Wireless Sensor Networks
    Luo, Hanjiang
    Wu, Kaishun
    Guo, Zhongwen
    Gu, Lin
    Yang, Zhong
    Ni, Lionel M.
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 879 - 888
  • [47] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Can, Okan
    Sahingoz, Ozgur Koray
    2015 6TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION, AND APPLIED OPTIMIZATION (ICMSAO), 2015,
  • [48] Design of an Intrusion Detection System for Wireless Sensor Networks
    Du, Ye
    Yang, Shuang
    Zhang, Ruhui
    SENSOR LETTERS, 2011, 9 (05) : 2082 - 2086
  • [49] Applying an Intrusion Detection Algorithm to Wireless Sensor Networks
    Wang, Qi
    Wang, Shu
    Meng, Zhonglou
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 284 - 287
  • [50] Physical-layer intrusion detection in wireless networks
    Tomko, A. A.
    Rieser, C. J.
    Buell, L. H.
    MILCOM 2006, VOLS 1-7, 2006, : 402 - +