An intrusion detection & adaptive response mechanism for MANETs
Tài liệu tham khảo
Nadeem, 2013, Protection of MANETs from a range of attacks using an intrusion detection and prevention system, Telecommunications Systems Journal Springer, 52, 2047, 10.1007/s11235-011-9484-6
O.F. Gonzalez Duque, A.M. Hadjiantonis, G. Pavlou, M. Howarth, Adaptable misbehaviour detection and isolation in wireless ad hoc networks using policies, in: Proc. IFIP/IEEE International Symposium on Integrated Network Management (IM), 1–5 June 2009.
Ping, 2007, Multi-agent cooperative intrusion response in mobile ad hoc networks, Elsevier Journal of System Engineering and Electronics, 18, 785, 10.1016/S1004-4132(08)60021-3
Zhang, 2006, Securing mobile ad hoc networks with certificateless public keys, IEEE Transactions on Dependable and Secure Computing, 3, 386, 10.1109/TDSC.2006.58
Kurosawa, 2007, Detecting blackhole attacks on AODV-based mobile ad hoc networks by dynamic learning method, International Journal of Network Security, 5
J. Sen, M. Chandra, S.G. Harihara, H. Reddy, P.Balamuralidhar, A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Network, in: Proc. IEEE ICICS, 2007.
P. Yi, Z. Dai, S.Zhang, Resisting flooding attack in ad hoc networks, in: Proc. IEEE International Conference on Information Technology Coding & Computing ITCC, April 2005.
Y. Hu, A. Perrig, B. Johnson, Rushing Attack and Defense in Wireless Ad Hoc Networks Routing Protocols, in: Proc. 2nd ACM Workshop on Wireless Security, New York, 2003.
Y.A. Mohamed, A.B. Abdullah, Implementation of IDS with response for securing MANETs, in: Proc. IEEE International symposium in information technology (ITSim), vol. 2, 2010, pp. 660–665.
K. Sanzgiri, M.Belding-Royer, A Secure routing protocol for ad hoc networks, in: Proc. 10th IEEE International Conference on Network Protocols (ICNP’ 02), 2002.
J. Joseph, A. Das, B. Seet and B.Lee, CRADS: Integrated cross layer approach for detecting routing attacks in MANETs, in: Proc. IEEE Wireless Communication and Networking Conference (WCNC), 31st March–3rd April 2008.
N. Stakhanova, S. Basu, J. Wong, A cost-sensitive model for preemptive intrusion response systems, in: Proc. IEEE 21st International Conference on Advance Networking and Applications (AINA), IEEE Computer Society, 2007.
Wang, 2007, Cost-sensitive intrusion response for mobile ad hoc networks
Bu, 2011, Structural results for combined continuous user authentication and intrusion detection in high security mobile ad hoc networks, IEEE Transactions on Wireless Communications, 10, 3064, 10.1109/TWC.2011.071411.102123
Liu, 2009, Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks, IEEE Transactions on Wireless Communications, 8, 806, 10.1109/TWC.2009.071036
A. Hasswa, M. Zulkernine, H.Hassanein, Routeguard: an intrusion detection and response system for mobile ad hoc network, in: Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2005), vol. 3, 2005, pp. 336–343.
Mitrokotsa, 2013, Intrusion detection in MANET using classification algorithms: the effects of cost and model selection, Elsevier Journal of Ad Hoc Networks, 11, 226, 10.1016/j.adhoc.2012.05.006
KDD Data Set used in 3rd International Knowledge Discovery and Data Mining Tool Competition, 1999. <http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html>.