A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
暂无分享,去创建一个
[1] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[2] Shui Yu,et al. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[3] Chu-Hsing Lin,et al. Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[4] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[5] Y. Venkataramani,et al. DDoS Attack and Defense Scheme in Wireless Ad hoc Networks , 2011, ArXiv.
[6] Xiapu Luo,et al. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals , 2009, EURASIP J. Adv. Signal Process..
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[8] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[9] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[10] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[11] David K. Y. Yau,et al. Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach , 2007, ASIACCS '07.
[12] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[13] Sung-Ho Kim,et al. DDoS flooding attack detection through a step-by-step investigation , 2011, 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications.
[14] Sukumar Nandi,et al. QoS Aware Stable path Routing (QASR) Protocol for MANETs , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[15] Dae-Wha Seo,et al. Intrusion detection based on traffic analysis in wireless sensor networks , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).
[16] Mohammad Najmud Doja,et al. Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs , 2008 .
[17] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] Saswati Sarkar,et al. Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[19] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.