{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:12:12Z","timestamp":1747807932844},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540231233"},{"type":"electronic","value":"9783540301431"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30143-1_7","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T23:59:24Z","timestamp":1284854364000},"page":"125-145","source":"Crossref","is-referenced-by-count":61,"title":["Attack Analysis and Detection for Ad Hoc Routing Protocols"],"prefix":"10.1007","author":[{"given":"Yi-an","family":"Huang","sequence":"first","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Gunter, C.A., Kim, M., Lee, I., Obradovic, D., Sokolsky, O., Viswanathan, M.: Verisim: Formal analysis of network simulations. IEEE Transactions on Software Engineering (2002)","DOI":"10.1109\/32.988495"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Proceedings of the International Conference on Machine Learning, pp. 115\u2013123 (1995)","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"7_CR3","unstructured":"Huang, Y., Fan, W., Lee, W., Yu, P.S.: Cross-feature analysis for detecting ad-hoc routing anomalies. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (May 2002)"},{"key":"7_CR4","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University (December 2001)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (Mobi-Com 2002) (September 2002)","DOI":"10.1145\/570645.570648"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. Software Engineering\u00a021(3), 181\u2013199 (1995)","journal-title":"Software Engineering"},{"key":"7_CR7","first-page":"139","volume-title":"Ad Hoc Networking, ch. 5","author":"D.B. Johnson","year":"2001","unstructured":"Johnson, D.B., Maltz, D.A., Broch, J.: DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, ch. 5, pp. 139\u2013172. Addison-Wesley, Reading (2001)"},{"key":"7_CR8","unstructured":"Ko, C., Ruschitzka, M., Levitt, K.N.: Execution monitoring of securitycritical programs in distributed systems: A specification-based approach. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 134\u2013144 (1997)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Kawadia, V., Zhang, Y., Gupta, B.: System services for ad-hoc routing: Architecture, implementation and experiences. In: First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), San Francisco, CA (May 2003)","DOI":"10.1145\/1066116.1189040"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Malkin, G.: RIP version 2 - carrying additional information. RFC 1723, Internet Engineering Task Force (November 1994)","DOI":"10.17487\/rfc1723"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Maltz, D.A., Broch, J., Jetcheva, J.G., Johnson, D.B.: The effects of on-demand behavior in routing protocols for multi-hop wireless ad hoc networks. IEEE Journal on Selected Areas in Communications (August 1999)","DOI":"10.1109\/49.779925"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. Mobile Computing and Networking\u00a0255 (2000)","DOI":"10.1145\/345910.345955"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Ning, P., Sun, K.: How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, June 2003, pp. 60\u201367 (2003)","DOI":"10.1109\/SMCSIA.2003.1232402"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Belding-Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. Internet draft draft-ietf-manet-aodv- 13.txt, Internet Engineering Task Force (February 2003) (expired 2003)","DOI":"10.17487\/rfc3561"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Perkins, C.E., Royer, E.M., Das, S.R., Marina, M.K.: Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Personal Communications Magazine special issue on Ad hoc Networking, 16\u201328 (February 2001)","DOI":"10.1109\/98.904895"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou, S.: Specification-based anomaly detection: A new approach for detecting network intrusions. In: Proceedings of the ACM Computer and Communication Security Conference, CCS 2002 (2002)","DOI":"10.1145\/586110.586146"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Tseng, C.-Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.N.: A specification-based intrusion detection system for AODV. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), George W. Johnson Center at George Mason University, Fairfax, VA (October 2003)","DOI":"10.1145\/986858.986876"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Vigna, G., Kemmerer, R.A.: NetSTAT: A network-based intrusion detection approach. In: Proceedings of the 14th Annual Computer Security Applications Conference (1998)","DOI":"10.1109\/CSAC.1998.738566"},{"key":"7_CR19","unstructured":"Zapata, M.G.: Secure ad hoc on-demand distance vector (SAODV) routing. Internet draft draft-guerrero-manet-saodv-00.txt, Internet Engineering Task Force (August 2001) (expired 2002)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Li, W.: An integrated environment for testing mobile adhoc networks. In: Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland (June 2002)","DOI":"10.1145\/513800.513813"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30143-1_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:44:53Z","timestamp":1605761093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30143-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540231233","9783540301431"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30143-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}