Applying mobile agent to intrusion response for ad hoc networks

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Existing security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks and there is no automated, network-wide counteraction against detected intrusions. While they all play an important role in counteracting intrusion, they do not, however, effectively address the root cause of the problem - intruders. In this paper, we propose the architecture of automated intrusion response. When an intruder is found in our architecture, the block agents will get to the neighbor nodes of the intruder and formed the mobile firewall to isolate the intruder. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Yi, P., Zhong, Y., & Zhang, S. (2005). Applying mobile agent to intrusion response for ad hoc networks. In Lecture Notes in Computer Science (Vol. 3515, pp. 593–600). Springer Verlag. https://doi.org/10.1007/11428848_77

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free