2006
DOI: 10.1109/jsac.2005.861388
|View full text |Cite
|
Sign up to set email alerts
|

A framework for misuse detection in ad hoc networks- part II

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 3 publications
0
21
0
Order By: Relevance
“…We prove that the latter is NP-hard. We subsequently describe a polynomial-complexity distributed approximation algorithm, "Maximum Unsatisfied Neighbors in Extended Neighborhood" (MUNEN), which attains the best possible approximation guarantee for the optimal selection problem [21], [25].…”
Section: B Selection Of Ids Active Insidersmentioning
confidence: 99%
See 2 more Smart Citations
“…We prove that the latter is NP-hard. We subsequently describe a polynomial-complexity distributed approximation algorithm, "Maximum Unsatisfied Neighbors in Extended Neighborhood" (MUNEN), which attains the best possible approximation guarantee for the optimal selection problem [21], [25].…”
Section: B Selection Of Ids Active Insidersmentioning
confidence: 99%
“…Thus, unless P = NP, the best possible approximation ratio for this selection problem is Ω(ln N ) (pp.112 − 116, [26]). In our earlier work [21], [25], we have proved that there exists a distributed computationally simple approximation algorithm MUNEN, that not only attains the above approximation ratio (O(ln N )) for the set-multicover problem, but also selects the same set of nodes as the best known centralized approximation algorithm. For completeness, we describe MUNEN here.…”
Section: Now the Detection Goal Of Attaining The Tolerable Expected mentioning
confidence: 99%
See 1 more Smart Citation
“…In the past, numerous research articles that addressed the problem of network intrusion modeling have appeared in the literature [8][9][10][11][12][13][14][15][16][17][18][19]. Kephart and White [8,9] published the first analytical work on the modeling of the propagation of viruses and worms.…”
Section: Introductionmentioning
confidence: 99%
“…In [4] and [5] the authors propose a framework for misuse detection which divides the nodes in a network into two categories: insiders and outsiders. Insiders are always well-behaved nodes in charge of performing network tasks.…”
Section: Related Workmentioning
confidence: 99%