Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks 2003
DOI: 10.1145/986858.986877
|View full text |Cite
|
Sign up to set email alerts
|

A cooperative intrusion detection system for ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
248
0
1

Year Published

2006
2006
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 373 publications
(249 citation statements)
references
References 19 publications
0
248
0
1
Order By: Relevance
“…The idea of overhearing traffic in the vicinity (e.g. [1]- [3]) has been used to build trust relationships among nodes in networks (e.g. [1], [2]), detect and mitigate certain kinds of attacks (e.g.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea of overhearing traffic in the vicinity (e.g. [1]- [3]) has been used to build trust relationships among nodes in networks (e.g. [1], [2]), detect and mitigate certain kinds of attacks (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…For systems where arriving at a common view is important, the detecting node initiates a distributed protocol to disseminate the alarm. Many protocols have been built on top of local monitoring for intrusion detection (e.g., [3]), building trust and reputation among nodes (e.g. [1], [2]), protecting against control and data traffic attacks (e.g.…”
mentioning
confidence: 99%
“…현재 다양한 클러스터링 기법들이 연구되었는데 그 중 단일홉 클러스터링의 대표적인 방법은 Lowest ID Clustering [8] 과 Highest Connectivity Clustering [9] 이고, 다중홉으로 토폴로지를 구성하는 알고리즘으로는 Adaptive Multihop Clustering [10] 이 대표적이며, 본 논문에서는 AMC클러스터링 알고리 즘을 기반으로 역추적 기능을 탑재 하였으며 또한 현재의 애드혹 기반 역추적 메커니즘을 살펴보도록 한다 [3] . …”
Section: ⅱ 관련 연구unclassified
“…In [25] Markov-chain based local anomaly detection model is proposed for a zone-Based IDS architecture where the network is divided into zones based on geographic partitioning. Another approach which constructs an anomaly-detection model automatically by extracting the correlations among monitored features is proposed in [12]. Furthermore, they introduced simple rules to determine attack types and sometimes attackers after detecting an attack using cross-feature analysis.…”
Section: Related Workmentioning
confidence: 99%