{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:54:51Z","timestamp":1742392491178},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540317784"},{"type":"electronic","value":"9783540317791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11663812_17","type":"book-chapter","created":{"date-parts":[[2006,1,20]],"date-time":"2006-01-20T07:57:08Z","timestamp":1137743828000},"page":"330-350","source":"Crossref","is-referenced-by-count":19,"title":["A Specification-Based Intrusion Detection Model for OLSR"],"prefix":"10.1007","author":[{"given":"Chinyang Henry","family":"Tseng","sequence":"first","affiliation":[]},{"given":"Tao","family":"Song","sequence":"additional","affiliation":[]},{"given":"Poornima","family":"Balasubramanyam","sequence":"additional","affiliation":[]},{"given":"Calvin","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Levitt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Boudec, J.: Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes - Fairness In Distributed Ad hoc NeTworks. In: Proceedings of IEEE\/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH (June 2002)","DOI":"10.1145\/513800.513828"},{"key":"17_CR2","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Technical Report No. DSC\/2001\/046, Swiss Federal Institute of Technology, Lausanne (August 2001)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Huang, Y.-a., Lee, W.: A Cooperative Intrusion Detection System for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003) (October 2003)","DOI":"10.1145\/986858.986877"},{"key":"17_CR4","unstructured":"Hu, Y., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Technical report, Rice University Department of Computer Science (June 2002)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the 6th Intl. Conference on Mobile Computing and Networking, Boston, MA, August 2000, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Ning, P., Sun, K.: How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad hoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003, pp. 60\u201367 (2003)","DOI":"10.1109\/SMCSIA.2003.1232402"},{"issue":"2","key":"17_CR7","first-page":"2","volume":"5","author":"R.C. Perrig","year":"2002","unstructured":"Perrig, R.C., Tygar, D., Song, D.: The TESLA broadcast authentication protocol. Cryptobytes (RSA Laboratories)\u00a05(2), 2\u201313 (Summer\/Fall 2002)","journal-title":"Cryptobytes (RSA Laboratories)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile Ad Hoc Networks. In: Proceedings of the IEEE Workshop on Security and Assurance in Ad Hoc Networks, Orlando, Florida (2003)","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"17_CR9","unstructured":"Rao, R., Kesidis, G.: Detection of malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. Brazilian Journal of Telecommunications (2003)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Ramanujan, R., Kudige, S., Nguyen, T., Takkella, S., Adelstein, F.: Intrusion-Resistant Ad Hoc Wireless Networks. In: Proceedings of MILCOM 2002 (October 2002)","DOI":"10.1109\/MILCOM.2002.1179592"},{"key":"17_CR11","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Belding-Royer, E., Shields, C.: A Secure Routing Protocol for Adhoc Networks. In: Proceedings of the 10 Conference on Network Protocols (ICNP) (November 2002)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A Specification-Based Intrusion Detection System For AODV. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003) (October 2003)","DOI":"10.1145\/986858.986876"},{"key":"17_CR13","unstructured":"Zapata, M.G.: Secure ad hoc on demand (SAODV) routing. IETF Internet Draft, draft-guerrero-manet-saodv-00.txt (August 2001)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)","DOI":"10.1145\/345910.345958"},{"key":"17_CR15","unstructured":"Clausen, T., Jacquet, P.: Optimized Link State Routing Protocol. IETF RFC 3626"},{"key":"17_CR16","unstructured":"Clausen, T., Jacquet, P., Laouiti, A., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized Link State Protocol. IEEE INMIC Pakistan 2001 (2001)"},{"key":"17_CR17","unstructured":"Gwalani, S., Srinivasan, K., Vigna, G., Belding-Royer, E.M., Kemmerer, R.: An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks. To appear in Proceedings of the Annual Computer Security Applications Conference, Tucson, AZ (December 2004)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Anjum, F., Talpade, R.R.: LiPad: Lightweight Packet Drop Detection for Ad Hoc Networks. In: Proceedings of the 2004 IEEE 60th Vehicular Technology Conference, Los Angeles (September 2004)","DOI":"10.1109\/VETECF.2004.1400219"},{"key":"17_CR19","unstructured":"Clausen, T., Jacquet, P., Laouiti, A., Muhlethaler, P.: Optimized Link State Routing Protocol. In: IEEE INMIC Pakistan 2001 (2001)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Ko, C., Ruschitzka, M., Levitt, K.: Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy (May 1997)","DOI":"10.1109\/SECPRI.1997.601332"},{"key":"17_CR21","unstructured":"Adjih, C., Clausen, T., Jacquet, P., Laouiti, A., M\u00fchlethaler, P., Raffo, D.: Securing the OLSR Protocol. Med-Hoc-Net 2003, Mahdia, Tunisia, June 25-27 (2003)"},{"key":"17_CR22","unstructured":"Laouiti, A.Q., Viennot, L.: Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks. In: 35th Annual Hawaii International Conference on System Sciences, HICSS 2002 (2002)"},{"key":"17_CR23","unstructured":"Jacquet, P., Laouiti, A., Minet, P., Viennot, L.: Performance Analysis of OLSR Multipoint Relay Flooding in Two Ad Hoc Wireless Network Models. Research Report-4260, INRIA, September 2001, RSRCP journal special issue on Mobility and Internet (2001)"},{"issue":"13","key":"17_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"2","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R., Porras, P.: State Transition Analysis: A Rule-based Intrusion Detection Approach. IEEE Transactions of Software Engineering\u00a02(13), 181\u2013199 (1995)","journal-title":"IEEE Transactions of Software Engineering"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Lindqvist, U., Porras, P.: Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In: Proceedings of the 1999 Symposium on Security and Privacy (May 1999)","DOI":"10.1109\/SECPRI.1999.766911"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1991)","DOI":"10.1109\/RISP.1991.130799"},{"key":"17_CR27","unstructured":"Hafslund, A., T\u00f8nnesen, A., Rotvik, R.B., Andersson, J., Kure, \u00d8.: Secure Extension to the OLSR Protocol. In: OLSR Interop and Workshop, San Diego (August 2004)"},{"issue":"2","key":"17_CR28","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/32.988495","volume":"28","author":"K. Bhargavan","year":"2002","unstructured":"Bhargavan, K., et al.: VERISIM: Formal Analysis of Network Simulations. IEEE Transactions of Software Engineering\u00a028(2), 129\u2013145 (2002)","journal-title":"IEEE Transactions of Software Engineering"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Subhadhrabandhu, D., et al.: Efficacy of Misuse Detection in Adhoc Networks. In: Proceedings of the 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 97\u2013107 (2004)","DOI":"10.1109\/SAHCN.2004.1381907"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Sterne, D., et al.: A General Cooperative Intrusion Detection Architecture for MANETs. In: Proceedings of the 3rd IEEE International Information Assurance Workshop (2005)","DOI":"10.1109\/IWIA.2005.1"},{"key":"17_CR31","unstructured":"Nuevo, J.: A Comprehensible GloMoSim Tutorial (March 2004)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11663812_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:04:28Z","timestamp":1605625468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11663812_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540317784","9783540317791"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11663812_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}