Font Size: a A A

Research On Technology Of Intrusion Detection In Mobile Ad Hoc Networks

Posted on:2009-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z J BiFull Text:PDF
GTID:2178360275472377Subject:Information security
Abstract/Summary:PDF Full Text Request
Ad Hoc network is an autonomy multi-hop network which is composed of a collection of mobile terminal devices. It is a self-organized, multi-hop routing network with no center and inconstant network topology. It is fit in military, emergency and other occasions. Now MANET has wide application potential in the civilian mobile telecommunications areas. Recently, ad hoc networks is regarded as the most likely adopted networks which can meet the need for the rapid deployment of independent mobile users.The communication of the mobile Ad Hoc network goes through a wireless channel, so there are a wide range of security threats. The traditional security mechanisms can not be used for Ad Hoc networks. Intrusion detection is an important technology for network security and plays an important role in the security of Ad hoc network.Based on summary of the research of Ad hoc Network security and intrusion detection, the main work is intrusion detection at network layer and link layer. In the network layer of mobile Ad hoc network, it engaged in extensive research on AODV protocol, and make use of finite state machine and pattern-matching to detect resource consumption attacks and serial number attacks against AODV protocol. To achieve attack and attack detection, we attach agents to nodes to achieve attack detection and attack, and by using of simulation tools NS2 attacks and detection are designed and implemented. The simulation results proved the model's efficiency and rationality.After thoroughly analysis of the 802.11 MAC protocol on link layer for Ad Hoc network, we do research on the principle of scanning attacks of Windows XP, it will forwardly sent probe request frames to find wireless networks around it. It is according to the frames'particularity, and by using of pattern-matching method to detect its scanning attack, then design the detection algorithm. Finally, the experiments results proved the method's efficiency, and it has been applied in wireless LAN intrusion detection project.
Keywords/Search Tags:Intrusion detection, Finite state machine, Pattern-matching
PDF Full Text Request
Related items