首页 | 本学科首页   官方微博 | 高级检索  
     

Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
作者姓名:DiWu  ZhishengLiu  YongxinFeng  GuangxingWang
作者单位:[1]DepartmentofComputerScience&Engineering,DalianUniversityofTechnology,Dalian116023 [2]InstituteofComputerCommunicationandNetwork,ShenyangInstituteofTechnology,Shenyang110016 [3]ResearchCenterforNetworkandCommunication,NortheasternUniversity,Shenyang110004
基金项目:ThisprojectissupportedbytheNational863HighTechnologyResearchandDevelopmentProgram(No.2003AA712032)
摘    要:There are inherent vulnerabillties that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad-Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network.

关 键 词:入侵检测  移动Ad-HOC网络  数据挖掘  网络安全  聚类检测

Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks
DiWu ZhishengLiu YongxinFeng GuangxingWang.Cluster-based Intrusion Detection in Wireless Ad-Hoc Networks[J].Computer Engineering and Applications,2004,40(29):122-125.
Authors:Di Wu  Zhisheng Liu  Yongxin Feng  Guangxing Wang
Abstract:There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad -Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network.
Keywords:intrusion detection  mobile Ad-Hoc networks  data mining Fund Project:This project is supported by the National863High Technology Research and Development  Program(No  2003AA712032)Brief Introduction to Author :Di  Wu  was born in1972  He  is a ass
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号