Research on Intrusion Detection Technology Based on Ad Hoc Network

Article Preview

Abstract:

As the second line of defense, intrusion detection is the necessary means of getting the high survivability. Intrusion detection technology and its classification is described in this article. And based on the features of Ad Hoc network, the existing new network intrusion detection technology and its characteristics suitable for Ad Hoc network are summarized.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2622-2625

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Macker J , Corson S. Mobile Ad Hoc Networks (MANET). Http: /www. ietf. org/html. charter/manet charter. Html, (1997).

DOI: 10.17487/rfc2501

Google Scholar

[2] Zhou L D, Hass Z J. Securing Ad Hoc networks. IEEE Nerworks Special Issue on Network Security, 1999, 7(06): 24-30.

Google Scholar

[3] Dai Y X, Lian Y F, Wang H. System Security and IntrusionDetection. Beijing: Tsinghua Publishing Company, (2002).

Google Scholar

[4] Kachirski O, Guha R. Intrusion Detection Using Mobile Agents inWireless Ad Hoc Networks. IEEE, July 2002: 10-12.

DOI: 10.1109/kmn.2002.1115178

Google Scholar

[5] Ljubica B , Levente B , Srdjan C , et al . Self - organization in mo2bile Ad hoc network : the approach of terminodes. IEEE Communication Magazine, 2001, 39(6) : 166 - 174.

Google Scholar

[6] Chen Z D , Kung H T , Vlah D. Ad Hoc Relay Wireless Net2 works over Moving Vehicles on Highways. ACM Special Interest Group on Mobility of Systems , Users , Data and Com2 puting. California , USA : ACM Press, 2001. 247 - 250.

DOI: 10.1145/501416.501451

Google Scholar

[7] Chung Weiho. Probabilistic analysis of routes on mobile ad hoc networks. IEEE. Communications Letters, 2004, 8 (8) : 506- 508.

DOI: 10.1109/lcomm.2004.833841

Google Scholar