首页 | 本学科首页   官方微博 | 高级检索  
     


Intrusion Detection Techniques for Mobile Wireless Networks
Authors:Zhang  Yongguang  Lee  Wenke  Huang  Yi-An
Affiliation:(1) HRL Laboratories LLC, Malibu, CA, USA;(2) College of Computing, Georgia Institute of Technology, GA, USA
Abstract:The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. In this paper, we examine the vulnerabilities of wireless networks and argue that we must include intrusion detection in the security architecture for mobile computing environment. We have developed such an architecture and evaluated a key mechanism in this architecture, anomaly detection for mobile ad-hoc network, through simulation experiments.
Keywords:intrusion detection  intrusion response  cooperative detection  anomaly detection  mobile ad-hoc networks
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号