{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:56:36Z","timestamp":1742388996015},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743194"},{"type":"electronic","value":"9783540743200"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74320-0_7","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T13:47:48Z","timestamp":1187272068000},"page":"127-145","source":"Crossref","is-referenced-by-count":18,"title":["Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Shiau-Huey","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chinyang Henry","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Levitt","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Bishop","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Clausen, T.T., Jacquet, P.: Optimized link state routing protocol (OLSR). IETF RFC3626"},{"key":"7_CR2","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561"},{"key":"7_CR3","unstructured":"Ogier, R., Templin, F., Lewis, M.: Topology Dissemination Based on Reverse-Path Forwarding (TBRPF). IETF RFC3684"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_13","volume-title":"Recent Advances in Intrusion Detection","author":"C.H. Tseng","year":"2006","unstructured":"Tseng, C.H., Wang, S.-H., Ko, C., Levitt, K.: DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model For MANET. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, Springer, Heidelberg (2006)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_17","volume-title":"Recent Advances in Intrusion Detection","author":"C.H. Tseng","year":"2006","unstructured":"Tseng, C.H., Song, T., Balasubramanyam, P., Ko, C., Levitt, K.: A Specification-based Intrusion Detection Model for OLSR. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, Springer, Heidelberg (2006)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Tseng, C., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., Levitt, K.: A Specification-Based Intrusion Detection System For AODV. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003) (October 2003)","DOI":"10.1145\/986858.986876"},{"key":"7_CR7","first-page":"60","volume-title":"Proceedings of the 4th Annual IEEE Information Assurance Workshop","author":"P. Ning","year":"2003","unstructured":"Ning, P., Sun, K.: How to Misuse AODV: A Case Study of Insider Attacks against Mobile Adhoc Routing Protocols. In: Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003, pp. 60\u201367. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"7_CR8","volume-title":"Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing","author":"S. Buchegger","year":"2002","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, Lausanne, Switzerland, June 2002, ACM Press, New York (2002)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA (August 2000)","DOI":"10.1145\/345910.345958"},{"key":"7_CR10","volume-title":"Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks","author":"Y.-a. Huang","year":"2003","unstructured":"Huang, Y.-a., Lee, W.: A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003, ACM Press, New York (2003)"},{"key":"7_CR11","volume-title":"Proceeding of First IEEE International Workshop on Next Generation Wireless Networks","author":"S.-H. Wang","year":"2005","unstructured":"Wang, S.-H., Tseng, C.H., Ko, C., Gertz, M., Levitt, K.: A general automatic response model for MANET. In: Proceeding of First IEEE International Workshop on Next Generation Wireless Networks, December 2005, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Tseng, C.H., Wang, S.-H., Levitt, K.: DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection Model for MANET. In: ASIACCS 2007 (2007)","DOI":"10.1145\/1229285.1229339"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Yi, S., Naldurg, P., Kravets, R.: Security-aware routing protocol for wireless ad hoc networks. In: Proceeding of ACM MobiHoc 2001 (October 2001)","DOI":"10.1145\/501449.501464"},{"issue":"6","key":"7_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network"},{"key":"7_CR15","volume-title":"Proceeding of the Tenth IEEE International Conference on Network Protocols","author":"K. Sanzgiri","year":"2002","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A secure routing protocol for ad hoc networks. In: Proceeding of the Tenth IEEE International Conference on Network Protocols, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"I. Balepin","year":"2003","unstructured":"Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using Specification-Based Intrusion Detection for Automated Response. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, Springer, Heidelberg (2003)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Advances in Intrusion Detection","author":"M. Tylutki","year":"2003","unstructured":"Tylutki, M., Levitt, K.N.: Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, Springer, Heidelberg (2003)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 9-13, 2002)","DOI":"10.1109\/CSAC.2002.1176302"},{"key":"7_CR19","unstructured":"Prasant, M., Srikanth, K. (eds.): Ad Hoc Networks: Technologies and Protocols (2004)"},{"key":"7_CR20","volume-title":"The 8th ACM International Conference on Mobile Computing and Networking","author":"Y.-C. Hu","year":"2002","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: The 8th ACM International Conference on Mobile Computing and Networking, September 2002, ACM Press, New York (2002)"},{"issue":"2","key":"7_CR21","first-page":"2","volume":"5","author":"P.R. Canetti","year":"2002","unstructured":"Canetti, P.R., Tygar, D., Song, D.: The TESLA broadcast authentication protocol. Cryptobytes (RSA Laboratories, Summer\/Fall 2002)\u00a05(2), 2\u201313 (2002)","journal-title":"Cryptobytes (RSA Laboratories, Summer\/Fall 2002)"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/65.484228","volume":"10","author":"G. White","year":"1996","unstructured":"White, G., Fisch, E., Pooch, U.: Cooperating security managers: A peer-based intrusion detection system. IEEE Network\u00a010, 20\u201323 (1996)","journal-title":"IEEE Network"},{"key":"7_CR23","unstructured":"Porras, P., Neumann, P.: EMERALD: event monitoring enabling responses to anomalous live disturbances. In: Proceedings of the 1997 National Information Systems Security Conference (1997)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (December 9-13, 2002)","DOI":"10.1109\/CSAC.2002.1176302"},{"key":"7_CR25","unstructured":"Nuevo, J.: A Comprehensible GloMoSim Tutorial (March 2004)"},{"key":"7_CR26","unstructured":"He, Q., Wu, D., Khosla, P.: SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks (2004)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of MobiHoc 2002, Lausanne (June 2002)","DOI":"10.1145\/513800.513828"},{"issue":"7","key":"7_CR28","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MCOM.2005.1470831","volume":"43","author":"S. Buchegger","year":"2005","unstructured":"Buchegger, S., Le Boudee, J.-Y.: Self-Policing Mobile Ad Hoc Networks by Reputation Systems. IEEE Communications Magazine\u00a043(7), 101\u2013107 (2005)","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"S.Y. Lindsay","year":"2006","unstructured":"Lindsay, S.Y., Wei, Y., Zhu, H., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 305\u2013317 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74320-0_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:21:36Z","timestamp":1605763296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74320-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540743194","9783540743200"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74320-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}