Font Size: a A A

Wireless Ad Hoc Network Intrusion Detection System

Posted on:2007-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:G Q JinFull Text:PDF
GTID:2208360185983405Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless Ad Hoc network consists of a collection of wireless nodes, all of which may be mobile; dynamically create a self-organizing network without using any network infrastructure or administrative support. Due to the limited transmission range of the mobile nodes, multiple network hops may be needed for the node to forward packets for other nodes in the network that may not be within direct wireless transmission range of each other. Therefore, each mobile node in the network operates not only as a host but also as a router。 In the recent years, wireless network has become an important part in the research fields of networks for its convenience, agility, quick establishment and good adaptability in some especial occasions and wireless Ad Hoc network has foreground in military communication, urgency affairs and commercial environment in the future because of its above virtues.At the same time, with the rapid development of the networks technology, the traditional passive way of protecting networks with firewalls and encryption software is no longer sufficient and effective, and so Intrusion Detection System as a kind of positive measure, has assumed paramount importance within the broad realm of network security, more so in the case of wireless Ad Hoc network. The inherently vulnerable characteristics of wireless Ad Hoc network, open medium, dynamic and variable topology, the absence of a certification authority and lack of a centralized monitoring or management unit, make it susceptible to attacks, and it may be too late before any counter action can take effect. Second, with so much advancement in hacking, if attackers try hard enough they will eventually succeed in infiltrating the system. This makes it important to constantly (or at least periodically) monitor what is taking place on a system and look for suspicious behavior. Intrusion detection systems do just that: monitor audit data, look for intrusions to the system, and initiate a proper response. So, there is a need to complement traditional security mechanisms with efficient intrusion detection and response.The. dissertation presents the characteristics of wireless Ad Hoc network and its security issues in detail, and introduces the important function of Intrusion Detection System within the realm of wireless Ad Hoc network security. We acquire idiographic...
Keywords/Search Tags:Ad Hoc network, intrusion detection system, mobile agent, cluster
PDF Full Text Request
Related items