{"title":"移动无线自组网中入侵检测系统的性价比分析","authors":"A. K. Pinnaka, D. Tharashasank, V. S. K. Reddy","doi":"10.1109/IADCC.2013.6514283","DOIUrl":null,"url":null,"abstract":"Like any other wireless communication settings, mobile ad-hoc network inherits potential dangerous vulnerabilities in network security. A proactive security defense such as intrusion detection system has become a recent research topic in this area. Many intrusion detection models are proposed by the researchers and most of them are promising. How-ever, the problem in mobile ad-hoc environment is that communication and power resources are very limited. Thus, any additional features which need to be implemented in this environment must be as efficient as possible. This paper presents a comparison study between the co-operative detection model and the aggregative detection model to evaluate the efficiency of resource usage. We use a sample case study of disaster recovery operations system to have a real scenario of mobile ad-hoc practice. An experiment is conducted using that scenario under different treatments. The contribution of our work is to suggest an intrusion detection model that is efficient but still reliable to use.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Cost performance analysis of intrusion detection system in mobile wireless ad-hoc network\",\"authors\":\"A. K. Pinnaka, D. Tharashasank, V. S. K. Reddy\",\"doi\":\"10.1109/IADCC.2013.6514283\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Like any other wireless communication settings, mobile ad-hoc network inherits potential dangerous vulnerabilities in network security. A proactive security defense such as intrusion detection system has become a recent research topic in this area. Many intrusion detection models are proposed by the researchers and most of them are promising. How-ever, the problem in mobile ad-hoc environment is that communication and power resources are very limited. Thus, any additional features which need to be implemented in this environment must be as efficient as possible. This paper presents a comparison study between the co-operative detection model and the aggregative detection model to evaluate the efficiency of resource usage. We use a sample case study of disaster recovery operations system to have a real scenario of mobile ad-hoc practice. An experiment is conducted using that scenario under different treatments. The contribution of our work is to suggest an intrusion detection model that is efficient but still reliable to use.\",\"PeriodicalId\":325901,\"journal\":{\"name\":\"2013 3rd IEEE International Advance Computing Conference (IACC)\",\"volume\":\"86 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-05-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 3rd IEEE International Advance Computing Conference (IACC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IADCC.2013.6514283\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 3rd IEEE International Advance Computing Conference (IACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IADCC.2013.6514283","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cost performance analysis of intrusion detection system in mobile wireless ad-hoc network
Like any other wireless communication settings, mobile ad-hoc network inherits potential dangerous vulnerabilities in network security. A proactive security defense such as intrusion detection system has become a recent research topic in this area. Many intrusion detection models are proposed by the researchers and most of them are promising. How-ever, the problem in mobile ad-hoc environment is that communication and power resources are very limited. Thus, any additional features which need to be implemented in this environment must be as efficient as possible. This paper presents a comparison study between the co-operative detection model and the aggregative detection model to evaluate the efficiency of resource usage. We use a sample case study of disaster recovery operations system to have a real scenario of mobile ad-hoc practice. An experiment is conducted using that scenario under different treatments. The contribution of our work is to suggest an intrusion detection model that is efficient but still reliable to use.