Font Size: a A A

The Research On Key Technologies Of Intrusion Detection And Security Routing For Mobile Ad Hoc Networks

Posted on:2008-02-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:X S XuFull Text:PDF
GTID:1118360245479137Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Mobile Ad Hoc network (MANET) has become the focus in the research of wireless network. MANET with special nature, is vulnerable to an adversary's malicious attacks. Moreover, the construction of the security system for MANET is more complicated. To study intrusion detection technology for mobile Ad Hoc network is a very significant work.With more and more application, security for mobile Ad Hoc networks becomes increasingly important. To secure mobile Ad Hoc networks, my dissertation will explore the security technologies in mobile Ad Hoc networks, including instruction detection model of Ad Hoc networks, algorithm of instruction detection, security routing mechanism. The contributions of this dissertation can be summarized as following:(1) A hybrid adaptive mobile Ad Hoc networks intrusion detection scheme is put forward. Intrusion Detection System will be divided into local and network detection of two parts; Because of a large amount of data in the host intrusion detection system (IDS), it is difficult to carry out a timely warning to the effective management of large, which results in network IDS analysis of issues such as difficulties in the detection of local control module adding the computing module, Its role is based on the characteristics of similar attacks on the extent of the collection to carry out attacks targeted, so as to reduce its detection module sent to the local redundant information and reduce the computing load wireless nodes and communication load and improve the accuracy of the alarm ; For the network IDS running, the network bandwidth and computing nodes limited resources, as well as Mobile Ad Hoc Networks dynamic topology characteristics, making changes in a short period of time network traffic will suddenly increased or decreased suddenly, which was mistakenly believe that this anomaly phenomenon, Detection module in the network adaptive detection algorithm, the algorithm based on the stability, security and rationality of cluster and choose the best first cluster nodes to reduce the computing resources across the network;(2) The application of data mining technology to anomaly detection system of mobile Ad Hoc networks is proposed. Through pointing out its existing problems, it is proposed that the outlier data mining technology is used in mobile Ad Hoc network anomaly detection system. Its core idea is that the anomaly intrusion detection process will be seen as a combination of knowledge in the field of data analysis process, the introduction of outlier data mining technology. In view of the existing anomaly detection algorithm which applies to only dimension of the data set lower, real-time difference, high rate of false positives, the ability to detect new types of attacks, Outlier data mining technology is designed to solve the existing problems in the mobile Ad Hoc networks anomaly intrusion detection system, and the working principle and system architecture is put forward, the function of each module is given a detailed explanation. Finally, a large amount experiments on DARPA1998, 1999 was carried out and the validation and effectiveness of our approach were verified, which has guidance sifnificance toward the following research work.(3) This dissertation proposes an efficient and secure routing scheme for Ad Hoc network. Routing security technology,which is one of key technologies in Ad Hoc networks,is analyzed. Also, Studies of the existing Ad Hoc network routing attack types is analyzed. By comparing the advantages and disadvantages of security protocol routing, Efficient and Secure Routing Scheme is put forward to solve security problems such as fabrication, modification in mobile Ad Hoc networks.
Keywords/Search Tags:Mobile Ad Hoc networks (MANET), Intrusion detection system (IDS), Anomaly detection, Outlier data mining, Routing protocol, network security
PDF Full Text Request
Related items