Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
Marianne AzerSherif El-KassasMagdy S. El-SoudaniPublished in: SECRYPT (2006)
Keyphrases
- ad hoc networks
- attack graph
- alert correlation
- attack graphs
- network topology
- routing protocol
- wireless ad hoc networks
- end to end
- wireless networks
- routing algorithm
- quality of service
- network configuration
- peer to peer
- attack scenarios
- intrusion detection
- anomaly detection
- multi hop
- mobile ad hoc networks
- key management
- mobile networks
- real time
- service differentiation
- multistage
- response time