Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.
Tao SongCalvin KoChinyang Henry TsengPoornima BalasubramanyamAnant ChaudharyKarl N. LevittPublished in: Formal Aspects in Security and Trust (2005)
Keyphrases
- intrusion detection
- ad hoc networks
- intrusion detection system
- routing protocol
- anomaly detection
- network security
- auto configuration
- wireless ad hoc networks
- network topology
- wireless networks
- network intrusion detection
- network traffic
- mobile ad hoc networks
- end to end
- distributed intrusion detection
- routing algorithm
- data mining techniques
- packet delivery
- multi hop
- key management
- mobile networks
- data mining
- quality of service
- information security
- detecting anomalous
- supervised learning
- end to end delay
- real world
- network intrusions
- traffic analysis
- security protocols
- peer to peer
- multipath