A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
Tài liệu tham khảo
Anantvalee, 2006
Azer, 2005, A survey on anomaly detection methods for ad hoc networks, Ubiquitous Computing and Communication Journal, 2, 67
Bose, 2007
Brutch P, Ko C. Challenges in intrusion detection for wireless ad-hoc networks. In: Symposium on applications and the internet workshops (SAINT’03 workshops); 2003. p. 368.
Deng H, Xu R, Li J, Zhang F, Levy R, Lee W. Agent-based cooperative anomaly detection for wireless ad hoc networks. In: Proceedings of the 12th conference on parallel and distributed systems; 2006. p. 613–20.
Djenouri, 2005, A survey of security issues in mobile ad hoc networks, IEEE Communications Surveys, 7, 10.1109/COMST.2005.1593277
Jacoby, 2007, Mobile host-based intrusion detection and attack identification, IEEE Wireless Communications, 14, 53, 10.1109/MWC.2007.4300984
Jha S, Tan K, Maxion R. Markov chains, classifiers, and intrusion detection. In: Proceedings of 14th IEEE computer security foundations workshop, Cape Breton, Nova Scotia, Canada; 2001, pp. 206–219.
Komninos, 2009, LIDF: layered intrusion detection framework for ad-hoc networks, Ad Hoc Networks, 7, 171, 10.1016/j.adhoc.2008.01.001
Lauf, 2010, A distributed intrusion detection system for resource-constrained devices in ad hoc networks, Ad Hoc Networks, 8, 253, 10.1016/j.adhoc.2009.08.002
Li Y, Wei J. Guidelines on selecting intrusion detection methods in MANET. In: The 21st annual conference for information systems educators (ISECON), Rhode Island, USA; 4–7 November, 2004.
Ma Chuan-xiang, Fang Ze-ming. A novel intrusion detection architecture based on adaptive selection event triggering for mobile ad-hoc networks. In: IEEE second international symposium on intelligent information technology and security informatics; January 2009. p. 198–201.
Manousakis K, Sterne D, Ivanic N, Lawler G, McAuley A. A stochastic approximation approach for improving intrusion detection data fusion structures. In: IEEE military communications conference (MILCOM 2008), San Diego, CA; November 2008. p. 1–7.
Marchang, 2008, Collaborative techniques for intrusion detection in mobile ad hoc networks, Ad Hoc Networks, 6, 508, 10.1016/j.adhoc.2007.04.003
Mishra, 2004, Intrusion detection in wireless ad hoc networks, IEEE Wireless Communications, 11, 48, 10.1109/MWC.2004.1269717
Nadkarni K, Mishra A. A novel intrusion detection approach for wireless ad hoc networks. In: IEEE wireless communications and networking conference (WCNC, 2004), vol. 2; March 2004. p. 831–6.
Otrok, 2008, A game-theoretic intrusion detection model for mobile ad hoc networks, Elsevier Computer Communications, 31, 708, 10.1016/j.comcom.2007.10.024
Ramachandran, 2008, FORK: a novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks, Elsevier Computer Communications, 31, 3855, 10.1016/j.comcom.2008.04.012
Razak, 2008, Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks, Ad Hoc Networks, 6, 1151, 10.1016/j.adhoc.2007.11.004
Sen, 2009, Intrusion detection in mobile ad hoc networks
Sun B, Wu K, Pooch UW. Routing anomaly detection in mobile ad hoc networks. In: IEEE international conference on computer communications and networks (ICCCN’03); 2003. p. 25–31.
Sun, 2007, Intrusion detection techniques in mobile ad hoc and wireless sensor networks, IEEE Wireless Communications, 14, 56, 10.1109/MWC.2007.4396943
Sun, 2007, Integration of mobility and intrusion detection for wireless ad hoc networks, Wiley International Journal of Communication Systems, 20, 695, 10.1002/dac.853
Wang, 2009, A framework for intrusion detection systems by social network analysis methods in ad hoc networks, Wiley Security and Communication Networks, 2, 669, 10.1002/sec.108
Zeng X, Bagrodia R, Gerla M, GloMoSim: a library for parallel simulation of large-scale wireless networks. In: Proceedings of the 12th workshop on parallel and distributed simulations (PADS ’98), Banff, Canada; May, 1998. p. 154–61.