Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð
ÇѱÛÁ¦¸ñ(Korean Title) |
Ad-hoc ³×Æ®¿öÅ©¿¡¼ÀÇ ÆòÆDZâ¹Ý ħÀÔŽÁö ±â¹ý |
¿µ¹®Á¦¸ñ(English Title) |
A Reputation-based Intrusion Detection Technique in Ad-hoc Network |
ÀúÀÚ(Author) |
ÀÌÀ±È£
À̼öÁø
Yunho Lee
Soojin Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 38 NO. 03 PP. 0138 ~ 0146 (2011. 06) |
Çѱ۳»¿ë (Korean Abstract) |
Ad-hoc ³×Æ®¿öÅ©´Â ºÐ»ê°ú Çùµ¿¿¡ ÀÇÇØ Ä§ÀÔŽÁö¸¦ ¼öÇàÇÏ´Â ±¸Á¶¸¦ °¡Áö±â ¶§¹®¿¡, °¢ ³ëµåµéÀÌ °³º°ÀûÀ¸·Î »ý¼ºÇÏ´Â ÆòÆÇ¿¡ ±â¹ÝÇÏ¿© ºñÁ¤»óÇàÀ§¸¦ ŽÁöÇÏ´Â Á¢±Ù¹æ¹ýÀº °ÅÁþÁö¸ñ ÇàÀ§¿¡ Ãë¾àÇÏ´Ù. ±×¸®°í °ÅÁþÁö¸ñ ÇàÀ§¿¡ ´ëÇÑ °ü¸®°¡ °í·ÁµÇÁö ¾ÊÀ» °æ¿ì¿¡´Â ħÀÔŽÁö °úÁ¤¿¡¼ Á¤»óÀûÀÎ ³ëµå°¡ ºñÁ¤»ó ÇàÀ§ ³ëµå·Î °£ÁÖµÇ¾î ³×Æ®¿öÅ©¿¡¼ ¹èÁ¦µÊÀ¸·Î½á ³×Æ®¿öÅ©ÀÇ È¿À²¼ºÀ̳ª »ýÁ¸¼ºÀÌ ½É°¢ÇÏ°Ô ÀúÇ쵃 ¼öµµ ÀÖ´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼´Â Ad-hoc ³×Æ®¿öÅ©¿¡¼ È¿À²ÀûÀ¸·Î °ÅÁþÁö¸ñ ÇàÀ§¸¦ ŽÁö ¹× °ü¸®ÇÒ ¼ö ÀÖ´Â °³¼±µÈ ÆòÆDZâ¹Ý ħÀÔŽÁö ±â¹ýÀ» Á¦¾ÈÇÏ°í, ¸ðÀǽÇÇèÀ» ÅëÇØ ¼º´ÉºÐ¼®À» ½Ç½ÃÇÑ´Ù. |
¿µ¹®³»¿ë (English Abstract) |
Because intrusion detection in Ad-hoc network is done by a distributed and cooperative manner, the detection technique based on the reputation generated by each node is vulnerable to a false accusation. If the management of the false accusation is not considered in the intrusion detection process, a normal node may be falsely accused, and it can cause severe performance degradation. Therefore, in this paper, we propose an enhanced reputation-based intrusion detection technique that can manage the false accusation efficiently and conduct simulation experiments for evaluation. |
Å°¿öµå(Keyword) |
¾ÖµåȤ ³×Æ®¿öÅ©
ħÀÔŽÁö
°ÅÁþÁö¸ñ
ÆòÆÇ
Ad-hoc
intrusion detection
false accusation
reputation
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|