Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection
碩士 === 國立臺灣科技大學 === 資訊工程系 === 93 === With the rapid development of wireless network technologies and the popularization of various kinds of mobile devices, wireless networks have become pervasive in our daily life nowadays. Wireless networks definitely provide an opportunity for malicious attackers...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/62030223028312604714 |
id |
ndltd-TW-093NTUST392041 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NTUST3920412015-10-13T11:39:46Z http://ndltd.ncl.edu.tw/handle/62030223028312604714 Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection 無線隨意行動網路上聯合防禦入侵偵測系統之研究 Chien-Liang Liu 劉建良 碩士 國立臺灣科技大學 資訊工程系 93 With the rapid development of wireless network technologies and the popularization of various kinds of mobile devices, wireless networks have become pervasive in our daily life nowadays. Wireless networks definitely provide an opportunity for malicious attackers to intrude or attack the system. Hence, wireless integrity becomes a very important task. In general, we can divide the wireless network into two categories, i.e., infrastructure and ad hoc networks. Due to the infrastructureless property of the ad hoc network, one of merits of the ad hoc network is convenience, which makes the ad hoc networks get popular recently. However, to set up a secured wireless ad hoc network, we should not only adopt the technique of encryption to ensure the confidentiality and privacy and the technique of authentication to avoid the illegal access to the network, but also equip each node with an intrusion detection system to detect malicious attackers so that some proper responses can be taken to reduce possible damage. In this thesis, we focus on the intrusion detection and shall propose an intrusion detection system that integrates the finite state machine (FSM) and a support vector machine (SVM) to analyze traffic patterns of wireless ad hoc networks. FSM is employed at the first stage of the detection system to find out attack nodes. Once FSM fails to determine whether the node is an attacker or not, SVM is then used at the second stage of the detection system by extracting characteristics from packets for training a suitable model. With such an intrusion detection system, usage of normal users and security of the wireless ad hoc network can be easily enhanced. Huei-Wen Ferng 馮輝文 2005 學位論文 ; thesis 0 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 資訊工程系 === 93 === With the rapid development of wireless network technologies and the popularization of various kinds of mobile devices, wireless networks have become pervasive in our daily life nowadays. Wireless networks definitely provide an opportunity for malicious attackers to intrude or attack the system. Hence, wireless integrity becomes a very important task. In general, we can divide the wireless network into two categories, i.e., infrastructure and ad hoc networks. Due to the infrastructureless property of the ad hoc network, one of merits of the ad hoc network is convenience, which makes the ad hoc networks get popular recently. However, to set up a secured wireless ad hoc network, we should not only adopt the technique of encryption to ensure the confidentiality and privacy and the technique of authentication to avoid the illegal access to the network, but also equip each node with an intrusion detection system to detect malicious attackers so that some proper responses can be taken to reduce possible damage. In this thesis, we focus on the intrusion detection and shall propose an intrusion detection system that integrates the finite state machine (FSM) and a support vector machine (SVM) to analyze traffic patterns of wireless ad hoc networks. FSM is employed at the first stage of the detection system to find out attack nodes. Once FSM fails to determine whether the node is an attacker or not, SVM is then used at the second stage of the detection system by extracting characteristics from packets for training a suitable model. With such an intrusion detection system, usage of normal users and security of the wireless ad hoc network can be easily enhanced.
|
author2 |
Huei-Wen Ferng |
author_facet |
Huei-Wen Ferng Chien-Liang Liu 劉建良 |
author |
Chien-Liang Liu 劉建良 |
spellingShingle |
Chien-Liang Liu 劉建良 Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection |
author_sort |
Chien-Liang Liu |
title |
Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection |
title_short |
Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection |
title_full |
Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection |
title_fullStr |
Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection |
title_full_unstemmed |
Study on a Joint Defense System for the Mobile Ad Hoc Networks with Intrusion Detection |
title_sort |
study on a joint defense system for the mobile ad hoc networks with intrusion detection |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/62030223028312604714 |
work_keys_str_mv |
AT chienliangliu studyonajointdefensesystemforthemobileadhocnetworkswithintrusiondetection AT liújiànliáng studyonajointdefensesystemforthemobileadhocnetworkswithintrusiondetection AT chienliangliu wúxiànsuíyìxíngdòngwǎnglùshàngliánhéfángyùrùqīnzhēncèxìtǒngzhīyánjiū AT liújiànliáng wúxiànsuíyìxíngdòngwǎnglùshàngliánhéfángyùrùqīnzhēncèxìtǒngzhīyánjiū |
_version_ |
1716848105024913408 |