[1]黄烟波 胡波 周忠华.簇技术在移动Adhoc网络入侵检测中的应用研究[J].计算机技术与发展,2007,(04):113-116.
 HUANG Yan-bo,HU Bo,ZHOU Zhong-hua.Application and Research of Cluster Technology in Intrusion Detection of Mobile Ad hoc Networks[J].,2007,(04):113-116.
点击复制

簇技术在移动Adhoc网络入侵检测中的应用研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2007年04期
页码:
113-116
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Application and Research of Cluster Technology in Intrusion Detection of Mobile Ad hoc Networks
文章编号:
1673-629X(2007)04-0113-04
作者:
黄烟波 胡波 周忠华
中南大学信息科学与工程学院
Author(s):
HUANG Yan-bo HU Bo ZHOU Zhong-hua
College of Information Science and Engineering, Central South University
关键词:
入侵检测数据挖掘移动Adhoc网络
分类号:
TP393.08
文献标志码:
A
摘要:
由于移动Adhoc网络的独特网络特性,其安全性特别脆弱。为其提供高安全的入侵检测系统势在必行,然而入侵检测审计数据的准确性、及时性、可靠性等是其获得高效的前提。在此将簇技术应用于Adhoc网络入侵检测中,有效地提高了Adhoc网络的安全性和对分布式攻击的协同检测能力,并降低了网络的通信负荷
Abstract:
There are inherent vulnerabilities that are not easily preventable in the mobile Ad hoc networks, To build a highly secure wireless Ad hoc networks intrusion detection techniques need to he deployed, but accuracy, timeliness and reliability of the audit data is the premise. In this paper, application of cluster technology in intrusion detection of mobile Ad hoc networks has been shown, which can enhance the security and collaborative detection capability of intrusion detection, and the communication load is reduced effectively

相似文献/References:

[1]李雷 丁亚丽 罗红旗.基于规则约束制导的入侵检测研究[J].计算机技术与发展,2010,(03):143.
 LI Lei,DING Ya-li,LUO Hong-qi.Intrusion Detection Technology Research Based on Homing - Constraint Rule[J].,2010,(04):143.
[2]马志远,曹宝香.改进的决策树算法在入侵检测中的应用[J].计算机技术与发展,2014,24(01):151.
 MA Zhi-yuan,CAO Bao-xiang.Application of Improved Decision Tree Algorithm in Intrusion Detection System[J].,2014,24(04):151.
[3]高峥 陈蜀宇 李国勇.混合入侵检测系统的研究[J].计算机技术与发展,2010,(06):148.
 GAO Zheng,CHEN Shu-yu,LI Guo-yong.Research of a Hybrid Intrusion Detection System[J].,2010,(04):148.
[4]林英 张雁 欧阳佳.日志检测技术在计算机取证中的应用[J].计算机技术与发展,2010,(06):254.
 LIN Ying,ZHANG Yan,OU Yang-jia.Application of Log Testing Technology in Computer Forensics[J].,2010,(04):254.
[5]李钦 余谅.基于免疫遗传算法的网格入侵检测模型[J].计算机技术与发展,2009,(05):162.
 LI Qin,YU Liang.Grid Intrusion Detection Model Based on Immune Genetic Algorithm[J].,2009,(04):162.
[6]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(04):170.
[7]李睿 肖维民.基于孤立点挖掘的异常检测研究[J].计算机技术与发展,2009,(06):168.
 LI Rui,XIAO Wei-min.Research on Anomaly Intrusion Detection Based on Outlier Mining[J].,2009,(04):168.
[8]胡琼凯 黄建华.基于协议分析和决策树的入侵检测研究[J].计算机技术与发展,2009,(06):179.
 HU Oiong-kai,HUANG Jian-hua.Intrusion Detection Based on Protocol Analysis and Decision Tree[J].,2009,(04):179.
[9]汪世义.基于优化支持向量机的网络入侵检测技术研究[J].计算机技术与发展,2009,(07):177.
 WANG Shi-yi.Network Intrusion Detection Based on Improved Support Vector Machine[J].,2009,(04):177.
[10]薛俊 陈行 陶军.一种基于神经网络的入侵检测技术[J].计算机技术与发展,2009,(08):148.
 XUE Jun,CHEN Hang,TAO Jun.Technology of Intrusion Detection Based on Neural Network[J].,2009,(04):148.
[11]胡波. 基于簇的移动自组网的IDMEF数据模型设计[J].计算机技术与发展,2016,26(08):93.
 HU Bo. Design of Data Model Intrusion of Detection Message Exchange Format in Wireless Ad Hoc Networks Based on Clusters[J].,2016,26(04):93.

备注/Memo

备注/Memo:
黄烟波(1959-),男,湖南邵阳人,教授,主要研究方向为计算机网络、现代教育技术
更新日期/Last Update: 1900-01-01