Research on Intrusion Detection Technique of Mobile Ad Hoc Network Security

Article Preview

Abstract:

By analyzing the characteristics of the existing intrusion detection techniques and limitations of network anomaly detection method is proposed. According to TCP/IP protocol packet structure characteristics, the behavior of a new notation, the definition of data packets through the network characteristics of the user's behavior to make up for past acts of intrusion detection system that is incomplete and non-real-time inadequate.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 694-697)

Pages:

2483-2488

Citation:

Online since:

May 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Aziz, M. Al Akaidi: 15th International Conference on Digital Signal Processing, Cardiff, Wales, UK, 2007, p.491~494.

Google Scholar

[2] L. Feng, Z. L. Li and Y. Zhang: Journal of Network and Computer Applications, 2009, 32(4): 781~787.

Google Scholar

[3] Y. Sun: Journal of Science & Technology Information, 2009, 4: 593~394.

Google Scholar

[4] O. Kachirski, R. Guha: 36th International Conference on System Sciences, Hawaii, USA, 2003, p.57~64.

Google Scholar

[5] B. Sun, L. Osborne and Y. Xiao: Journal of IEEE Wireless Communications, 2004, 11(1): 48~60.

Google Scholar

[6] N. Marchang and R. Datta: Journal of Ad Hoc Networks, 2008, 6(4):508~523.

Google Scholar

[7] H. Zhou, J. L. Li and N. Zhao: International Conference Multi-Media and Information Technology, Busan, Korea, 2008, p.598~601.

Google Scholar

[8] Y. G. Zhang, W. Lee: 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, 2000, p.275~283.

Google Scholar

[9] D. kadono, T. Izumi and F. Ooshita: Journal of Ad Hoc Net Networks, 2010, 8(1): 63~76.

Google Scholar

[10] O. Kachirski, R. Guha: IEEE Workshop on Knowledge Media Networking, Kyoto, Japan, 2002, p.153~158.

Google Scholar

[11] C. Y. Tseng, B. Poornima and K. Calvin: the 2003 ACM Worgshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, USA, 2003, p.125~134.

Google Scholar

[12] P. Yi, Y. Zhang and S. Y. Zhang: 5th IEEE International Symposium and School on Advance Distributed Systems, Jalisco, 2005.

Google Scholar

[13] A. Agah, S. K. Das and K. Basu: 3th IEEE International Symposium Network Computing and Applications, Boston, Mass, USA, 2004, p.343~346.

Google Scholar

[14] H. W. Feng, C. L. Liu: Vehicular Technology Conference, Montreal, Canada, 2006, p.742~746.

Google Scholar

[15] T. F. Lunt, R. Jagananathan and R. Lee: Computer Science Laboratory, SRI International, Menlo Park, CA. October, 1988, Number SRI-CSL-88-12.

Google Scholar

[16] D. Joo, T. Hong, I. Han: Journal of Expert Systems with Applications, 2003, 25(1): 69~75.

Google Scholar