作者: A. Karygiannis , E. Antonakakis , A. Apostolopoulos
关键词:
摘要: Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common design goal of reactive, proactive, hybrid ad is faithfully route packets from a source node destination while maintaining satisfactory level service in resource-constrained environment. Detecting malicious nodes an open which participating no previous security associations presents number challenges not faced by traditional wired networks. Traffic monitoring networks usually performed at switches, routers gateways, but does these types elements where the intrusion detection system (IDS) can collect analyze audit data for entire network. A neighbor-monitoring, trust-building, cluster-based voting schemes proposed research enable reporting activity resources consumed member monitor, detect, report, diagnose activity, however, may be greater than simply rerouting through different available path. This paper method determining conditions under critical should monitored, describes details test implementation, experimental results, offers new approach conserving limited IDS.