首页> 外文OA文献 >Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks
【2h】

Cluster-based Intrusion Detection (CBID) architecture for mobile ad hoc networks

机译:移动自组织网络的基于群集的入侵检测(CBID)架构

摘要

The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusionuddetection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node andudhelp to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additionaludadvantage in these processing constrained networks to collaboratively detect intrusions with less powerudusage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes,udbecause they are linked with the routes. The route establishment and route renewal affects the clusters and asuda consequence, the processing and traffic overhead increases due to instability of clusters. The ad hocudnetworks are battery and power constraint, and therefore a trusted monitoring node should be available touddetect and respond against intrusions in time. This can be achieved only if the clusters are stable for a longudperiod of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to beudeffective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routingudprotocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplifiedudclustering scheme has been used to detect intrusions, resulting in high detection rates and low processingudand memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in theudnetwork. Clustering is also useful to detect intrusions collaboratively since an individual node can neitheruddetect the malicious node alone nor it can take action against that node on its own.
机译:由于分散的性质和缺乏基础架构,ad hoc网络容易受到攻击。入侵 uddetect系统(IDS)提供审核和监视功能,这些功能可为节点提供本地安全性,并且 udhelp可以感知其他节点的特定信任级别。在这些处理受限的网络中,可以将群集协议作为额外的 u优势,以便以更少的功耗消耗和最小的开销协作地检测入侵。现有的群集协议不适用于入侵检测,因为它们与路由链接。路由建立和路由更新会影响群集,结果,由于群集的不稳定,处理和流量开销也会增加。 ad hoc udnetwork受电池和电源限制,因此,受信任的监视节点应可用于 uddetect并及时响应入侵。仅当群集长时间稳定后才能实现。如果群集由于路由而有规律地更改,则入侵检测将不会被证明是无效的。因此,提出了一种通用的聚类算法,该算法可以在任何路由 udprotocol之上运行,并且可以不依赖于路由而持续监视入侵。所提出的简化集群化方案已用于检测入侵,从而导致 udud网络中节点的路由,连接,流量类型和移动性无关,从而导致较高的检测率和较低的处理 udand内存开销。群集对于协同检测入侵也很有用,因为单个节点既不能单独 udud检测到恶意节点,也不能独自对付该节点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号