E-commerce security requirement analysis and intrusion detection deployment in ad hoc networks = 전자상거래 보안 요구사항 분석과 ad hoc 네트워크 침입탐지에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 573
  • Download : 0
This study focus on e-commerce security requirement analysis for system evaluation, intrusion detection deployment in mobile ad hoc networks, and educational requirement analysis for e-commerce security. In e-commerce environment, security should be considered as an essential factor for success. In this thesis, we present a security evaluation model for e-commerce system, and it is focused on the practical usage, not theoretical contribution, in the field of e-commerce security. To create necessary security requirements, we mainly investigate the previous researches related to the e-commerce, and also inquire the professionals whether there are more necessary security requirements not covered from the researches. For the systematic organization of the requirements, we estimate the relative importance of each requirement using the Delphi and Analytic Hierarchical Process (AHP) method. Another issue concerned for this thesis is a deployment of intrusion detection system (IDS) in mobile ad hoc networks. The rapid change of mobile ad hoc networks and mobile computing application has occurred recently. Unlike fixed wired networks, the mobile ad hoc networks have some differences that mobile nodes have limited bandwidth, battery power, and dynamic change of ad-hoc network situations. These differences cause the mobile ad hoc networks to be vulnerable to additional threats that do not exist in a fixed wired network. Therefore, security problem is an important issue for mobile ad hoc networks. In this thesis, we propose a monitoring node selection scheme for intrusion detection in mobile ad hoc networks. Network survivability is an important issue in a mobile ad hoc network and proposed scheme considers the remaining battery power of each node in selecting monitoring nodes to extend its lifetime. The simulation results show that proposed scheme can actually extend the lifetime of the whole network while providing a required level of intrusion detection in ad hoc ...
Kim, Se-Hunresearcher김세헌researcher
한국과학기술원 : 산업공학과,
Issue Date
254263/325007  / 020015821

학위논문(박사) - 한국과학기술원 : 산업공학과, 2006.2, [ vi, 93 p. ]


애드 혹 네트워크; 침입탐지; AHP; 보안; 전자상거래; intrusion detection; ad hoc network; AHP; security; e-commerce

Appears in Collection
Files in This Item
There are no files associated with this item.


  • mendeley


rss_1.0 rss_2.0 atom_1.0