Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection

碩士 === 國立臺灣科技大學 === 資訊工程系 === 93 === With the rapid development of wireless network technologies and the popularization of various kinds of mobile devices, wireless networks have become pervasive in our daily life nowadays. Wireless networks definitely provide an opportunity for malicious attackers...

Full description

Bibliographic Details
Main Authors: Chien-Liang Liu, 劉建良
Other Authors: Huei-Wen Ferng
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/62030223028312604714
Description
Summary:碩士 === 國立臺灣科技大學 === 資訊工程系 === 93 === With the rapid development of wireless network technologies and the popularization of various kinds of mobile devices, wireless networks have become pervasive in our daily life nowadays. Wireless networks definitely provide an opportunity for malicious attackers to intrude or attack the system. Hence, wireless integrity becomes a very important task. In general, we can divide the wireless network into two categories, i.e., infrastructure and ad hoc networks. Due to the infrastructureless property of the ad hoc network, one of merits of the ad hoc network is convenience, which makes the ad hoc networks get popular recently. However, to set up a secured wireless ad hoc network, we should not only adopt the technique of encryption to ensure the confidentiality and privacy and the technique of authentication to avoid the illegal access to the network, but also equip each node with an intrusion detection system to detect malicious attackers so that some proper responses can be taken to reduce possible damage. In this thesis, we focus on the intrusion detection and shall propose an intrusion detection system that integrates the finite state machine (FSM) and a support vector machine (SVM) to analyze traffic patterns of wireless ad hoc networks. FSM is employed at the first stage of the detection system to find out attack nodes. Once FSM fails to determine whether the node is an attacker or not, SVM is then used at the second stage of the detection system by extracting characteristics from packets for training a suitable model. With such an intrusion detection system, usage of normal users and security of the wireless ad hoc network can be easily enhanced.