System for intrusion detection
First Claim
Patent Images
1. A system for operating a wireless ad hoc network, said system comprising:
- a plurality of nodes; and
a plurality of protocols for governing transmission of data between said plurality of nodes, the operation of said protocols being quantified by a complexity metric for determining whether an external source has altered the operation of said system.
2 Assignments
0 Petitions
Accused Products
Abstract
A system a wireless ad hoc network. The system includes a plurality of nodes and a plurality of protocols for governing transmission of data between the plurality of nodes. The operation of the protocols is quantified by a complexity metric for determining whether an external source has altered the operation of the system.
39 Citations
19 Claims
-
1. A system for operating a wireless ad hoc network, said system comprising:
-
a plurality of nodes; and
a plurality of protocols for governing transmission of data between said plurality of nodes, the operation of said protocols being quantified by a complexity metric for determining whether an external source has altered the operation of said system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for detecting intrusions to a network, said computer program product comprising:
-
a first instruction for operating a plurality of nodes with a plurality of protocols;
a second instruction for governing transmission of data between the plurality of nodes;
a third instruction for quantifying the operation of the protocols by a complexity metric; and
a fourth instruction for determining whether an external source has altered the operation of the network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for operating a network, said method comprising the steps of:
-
operating a plurality of nodes with a plurality of protocols;
governing transmission of data between the plurality of nodes;
quantifying the operation of the protocols by a complexity metric; and
determining whether an external source has altered the operation of the network. - View Dependent Claims (16, 17, 18, 19)
-
Specification