跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.91) 您好!臺灣時間:2024/12/10 06:24
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:鍾尚衛
研究生(外文):Shang-Wei Chung
論文名稱:應用動態信賴在行動隨意網路上的聯合防禦式入侵偵測系統
論文名稱(外文):Applying Dynamic Trust on The Union-Defense-Based IDS of MANET
指導教授:羅濟群羅濟群引用關係
指導教授(外文):Chi-Chun Lo
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊管理研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:57
中文關鍵詞:行動隨意網路聯合防禦入侵偵測系統動態信賴機制惡意節點
外文關鍵詞:Mobile ad hoc network (MANET)Union-defense-basedIntrusion detection system (IDS)Dynamic-trust modelmalicious node
相關次數:
  • 被引用被引用:0
  • 點閱點閱:132
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
行動隨意網路(MANET:Mobile Ad hoc NETwork),其特色為不需要存取點(AP:Access Point)的存在,每一行動節點本身即為一獨立單位,而各個行動節點可以任意與其他行動節點利用無線的方式做連結,互相通訊互相傳遞資料。相較於有線網路,除了基本的架構和傳輸的方式不同之外,安全是另一個重要的議題。因為行動隨意網路是開放式的環境,節點可以任意的進出由許多獨立的節點所形成的行動隨意網路。因此,對於某節點的訊息是否該信任,又該節點是否有入侵攻擊等行為,是需要加入列為考量的因素。於本論文中,將根據行動隨意網路的聯合防禦式入侵偵測系統,加入動態信賴機制,藉由對每個行動節點信賴值的動態變化,結合原多數決投票機制,降低可能因有惡意節點的存在所造成的誤判率,使判斷入侵偵測訊息使否可靠的決策更精確。
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 3
1.3 研究流程 3
1.4 章節規劃 4
第二章 文獻探討 5
2.1 從有線網路到行動隨意網路 5
2.2 入侵偵測系統 9
2.3 聯合防禦式入侵偵測系統 13
2.4 信賴機制 17
第三章 動態信賴機制 22
3.1 連續信賴值 22
3.2 動態信賴機制 24
3.3 初始值設定 28
3.4 降低誤判率 34
3.5 小結 35
第四章 系統環境模擬與評估 36
4.1 實作平台與環境 36
4.2 實作一:初始信賴值設定 37
4.2.1 初始信賴值設定方法及原則之說明 37
4.2.2 實作結果驗證及分析 38
4.3 實作二:節點移動 41
4.3.1 節點移動程度之說明 41
4.3.2 實作結果驗證及分析 43
4.4 實作三:惡意節點 44
4.4.1 惡意節點之說明 44
4.4.2 實作結果驗證及分析 45
4.5 誤判率評估 49
4.5.1 情境一:當有正確的訊息應該發送給其他節點時 49
4.5.2 情境二:當有錯誤的訊息不應該發送給其他節點時 51
4.6 小結 52
第五章 結論及未來發展 53
5.1 結論 53
5.2 未來發展 53
參考文獻 55
[1] P. Albers, O. Camp, J. M. Percher, B. Jouga, L. Me, R. Puttini, “Security in Ad Hoc Networks: a General Intrusion Detection Archtitecture Enhancing Trust Based Approaches”, Proceedings of the First International Workshop on Wireless Networks, 2002
[2] Florina Almenarez, Celeste Campo, “SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks”, the 9th Open European Summer School and IFIP Workshop, 2003
[3] Stefan Axelsson, “Research in Intrusion-Detection System: A Survay”, Department of Computer Engineering, Chalmers University of Technology Goteborg, Sweden, 1999
[4] Yuebin Bai, Hidetsune Kobayashi, “Intrusion Detection System: Technology and Development”, the 17th International Conference on Advanced Information Networking and Applications (AINA’03), IEEE, 2003
[5] John S. Baras, Tao Jiang, “Managing Trust in Self-organized Mobile Ad Hoc Networks”, Collaborative Participation in The Communications and Networks Consortium Sponsored by the US Army Research Laboratory.
[6] Sonja Buchegger, Jean-Yves Le Boudec, “Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks)”, MOBIHOC’02, Jaun 9-11, 2002, EPFL Lausanne, Switzerland.
[7] Cristiano Castelfranchi, Rino Falcone, Giovanni Pezzulo, “Trust in Information Sources as a Source for Trust: A Fuzzy Approach”, the 2nd International Joint Conference, 2003
[8] Partha Dasgupta, Eric Maskin, “Is Majority Rule the Best Voting Method?”, The Department of Economics, the University of Cambridge, UK, 2003
[9] C. Duma, N. Shahmehri, G. Caronni, “Dyamic Trust Metrics for Peer-to-Peer Systems”, the 16th International Workgroup on Database and Expert Systems Applications (DEXA’05), 2005
[10] Nathan Einwechter, “An Introduction To Distributed Intrusion Detection Systems”, Senior Research, 2001
[11] C. English, P. Nixon, S. Terzis, A. McGettrick, H. Lowe, “Dynamic Trust Models for Ubiquitous Computing Environments”, Department of Computer and Information Sciences, University of Strathclyde, Glasgow, Scotland, 2002
[12] Shenglan Hu, Chris J. Mitchell, “Improving IP address autoconfiguration security in MANETs using trust Modelling”, Lecture Notes in Computer Science, 2005
[13] Yi-an Huang, Wenke Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, the 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, Virginia, 2003
[14] Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang, “A Novel Autonomous Trust Management Model for Mobile Agents”, Lecutre Notes in Computer Science 3073:56-65, 2004.
[15] Zhaoyu Liu, Anthony W. Joy, Robert A. Thompson, “A Dyamic Trust Model for Ad Hoc Networks”, the 10th IEEE International Workshop on Future Treads of Distributed Computing System (FTDCS’04), 2004
[16] J. R. Parker, “Voting Methods For Multiple Autonomous Agents”, Intelligent Information Systems, proceeding of the 3rd Australian and New Zealand Conference, 1995
[17] Royce Robbins, “Distributed Intrusion Detection Systems: An Introduction and Review”, GSEC Practical Assignment, SANS Institute, 2003
[18] Kuen-Liang Sue, Chi-Chun Lo, “N-Class Replacement Policy for Resolving Mobility Database Overflow”, National Chiao Tung University, Hsinchu, Taiwan, Proceedings of ICCT, 2003
[19] Kuen-Liang Sue, Chi-Chun Lo, “Overflow control in mobile communication using N-class replacement”, Electronic Letters 23rd January 2003, Vol. 39, No. 2, P238-239
[20] Yan Sun, Wei Yu, Zhu Han, K. J. Ray Liu, “Trust Modeling and Evaluation in Ad Hoc Networks”, Global Telecommunications Conference (GLOBECOM’05), IEEE, 2005
[21] Yuan Yean, William Arbaugh, “A Secure Service Discovery Protocol for MANET”, the 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication Proceedings, 2003
[22] Yongguang Zhang, Wenke Lee, “Intrusion Detection in Wireless Ad-Hoc Networks”, MOBICOM 2000 Boston MA USA, ACM, 2000
[23] 顧吉宇, 羅濟群, “一個針對無基礎行動網路的聯合防禦式的入侵偵測系統”, 資訊管理研究所碩士論文, 國立交通大學, 2004
[24] 陳亦明,“分散式系入侵偵測系統研究現況介紹”,資訊安全通訊2002,Vol. 8
[25] Benjurry, “Ad Hoc 安全防�� – Ad Hoc 的安全分析和IDS模型”, Xfocus, 2002
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top