• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð

Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð

Current Result Document : 55 / 102 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Ad-hoc ³×Æ®¿öÅ©¿¡¼­ÀÇ ÆòÆDZâ¹Ý ħÀÔŽÁö ±â¹ý
¿µ¹®Á¦¸ñ(English Title) A Reputation-based Intrusion Detection Technique in Ad-hoc Network
ÀúÀÚ(Author) ÀÌÀ±È£   À̼öÁø   Yunho Lee   Soojin Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 38 NO. 03 PP. 0138 ~ 0146 (2011. 06)
Çѱ۳»¿ë
(Korean Abstract)
Ad-hoc ³×Æ®¿öÅ©´Â ºÐ»ê°ú Çùµ¿¿¡ ÀÇÇØ Ä§ÀÔŽÁö¸¦ ¼öÇàÇÏ´Â ±¸Á¶¸¦ °¡Áö±â ¶§¹®¿¡, °¢ ³ëµåµéÀÌ °³º°ÀûÀ¸·Î »ý¼ºÇÏ´Â ÆòÆÇ¿¡ ±â¹ÝÇÏ¿© ºñÁ¤»óÇàÀ§¸¦ ŽÁöÇÏ´Â Á¢±Ù¹æ¹ýÀº °ÅÁþÁö¸ñ ÇàÀ§¿¡ Ãë¾àÇÏ´Ù. ±×¸®°í °ÅÁþÁö¸ñ ÇàÀ§¿¡ ´ëÇÑ °ü¸®°¡ °í·ÁµÇÁö ¾ÊÀ» °æ¿ì¿¡´Â ħÀÔŽÁö °úÁ¤¿¡¼­ Á¤»óÀûÀÎ ³ëµå°¡ ºñÁ¤»ó ÇàÀ§ ³ëµå·Î °£ÁÖµÇ¾î ³×Æ®¿öÅ©¿¡¼­ ¹èÁ¦µÊÀ¸·Î½á ³×Æ®¿öÅ©ÀÇ È¿À²¼ºÀ̳ª »ýÁ¸¼ºÀÌ ½É°¢ÇÏ°Ô ÀúÇ쵃 ¼öµµ ÀÖ´Ù. ÀÌ¿¡ º» ³í¹®¿¡¼­´Â Ad-hoc ³×Æ®¿öÅ©¿¡¼­ È¿À²ÀûÀ¸·Î °ÅÁþÁö¸ñ ÇàÀ§¸¦ ŽÁö ¹× °ü¸®ÇÒ ¼ö ÀÖ´Â °³¼±µÈ ÆòÆDZâ¹Ý ħÀÔŽÁö ±â¹ýÀ» Á¦¾ÈÇÏ°í, ¸ðÀǽÇÇèÀ» ÅëÇØ ¼º´ÉºÐ¼®À» ½Ç½ÃÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Because intrusion detection in Ad-hoc network is done by a distributed and cooperative manner, the detection technique based on the reputation generated by each node is vulnerable to a false accusation. If the management of the false accusation is not considered in the intrusion detection process, a normal node may be falsely accused, and it can cause severe performance degradation. Therefore, in this paper, we propose an enhanced reputation-based intrusion detection technique that can manage the false accusation efficiently and conduct simulation experiments for evaluation.
Å°¿öµå(Keyword) ¾ÖµåȤ ³×Æ®¿öÅ©   ħÀÔŽÁö   °ÅÁþÁö¸ñ   ÆòÆÇ   Ad-hoc   intrusion detection   false accusation   reputation  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå