首页 | 本学科首页   官方微博 | 高级检索  
     

基于规范的移动Ad Hoc网络分布式入侵检测
引用本文:王芳,易平,吴越,王之旸.基于规范的移动Ad Hoc网络分布式入侵检测[J].计算机科学,2010,37(10):118-122.
作者姓名:王芳  易平  吴越  王之旸
作者单位:1. 江苏科技大学计算机科学与工程学院,镇江,212003
2. 上海交通大学信息安全工程学院,网络信息安全教育部工程研究中心,上海,200030
基金项目:本文受国家自然科学基金重点项目(60932003),国家高技术研究发展计划项目(863计划)(2007AA01Z452),上海市自然科学基金资助项目(09ZR1414900),国家大学生创新活动计划项目(091024812)资助。
摘    要:移动ad hoc网络是移动节点自组织形成的网络,由于其动态拓扑、无线传输的特点,容易遭受各种网络攻击。传统的网络安全措施,如防火墙、加密、认证等技术,在移动ad hoc网络中难以应用,因此提出一种基于有限状态机分布式合作的入侵检测算法。首先,将整个网络分为子区域,每一区域随机选出簇头担任监视节点,负责本区域的入侵检测。其次,按照DSR路由协议构筑节点正常行为和入侵行为的有限状态机,监视节点收集其邻居节点的行为信息,利用有限状态机分析节点的行为,发现入侵者。本算法不需要事先进行数据训练并能够实时检测入侵行为。最后,通过模拟实验证实了算法的有效性。

关 键 词:移动ad  hoc网络,路由协议,网络安全,入侵检测,有限状态机
收稿时间:2009/11/30 0:00:00
修稿时间:2/1/2010 12:00:00 AM

Specification-based Distributed Detection for Mobile Ad Hoc Networks
WANG Fang,YI Ping,WU Yue,WANG Zhi-yang.Specification-based Distributed Detection for Mobile Ad Hoc Networks[J].Computer Science,2010,37(10):118-122.
Authors:WANG Fang  YI Ping  WU Yue  WANG Zhi-yang
Affiliation:(School of Computer Science and Engineering,Jiangsu University of Science and Technology,Zhenjiang 212003,China)(network Information Security Research Center of the Ministry of Education,School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200030, China)
Abstract:Mobile ad hoc networks are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. We proposed a distributed intrusion detection approach based on finish state machine(FSM). A cluster-based detection scheme was presented,where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we constructed the finite state machine(FSM) by the way of manually abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing(DSR). The monitor nodes can verify every node's behaviour by the FSM, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness. Finally, we evaluated the intrusion detection method through simulation experiments.
Keywords:Mobile ad hoc networks  Routing protocol  Network security  Intrusion detection  Finite state machine
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号