Filters








1,590 Hits in 3.4 sec

Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks

Geethapriya Thamilarasu, Ramalingam Sridhar
2007 MILCOM 2007 - IEEE Military Communications Conference  
To this end, we evaluate different cross-layer architectures and analyze their efficiency in intrusion detection systems.  ...  In this paper, we discuss the challenges and opportunities of using cross-layer techniques for enhancing wireless network security.  ...  Cross-layer IDS based on Direct Per-layer Interactions (Type I) We have developed a Type I intrusion detection system for improved detection and better evaluation of malicious activity in the network.  ... 
doi:10.1109/milcom.2007.4454962 fatcat:jxnhzq2idnbx3p7monmcljru2y

Systematic Literature Review over IDPS, Classification and Application in its Different Areas

Shehroz Afzal, Jamil Asim
2021 STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH  
Anomaly-based Intrusion Detection Systems (AIDS).  ...  Presenting a classification of network anomaly IDS evaluation metrics and discussion on the importance of the feature selection.  ...  Acknowledgement Authors are thankful to the Editorial Team for their constructive support.  ... 
doi:10.52700/scir.v3i2.58 fatcat:xrczlxjg5ncclf2ftxyw3y5zce

Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems

Khalid Nasr
2012 International journal of network security and its applications  
the form of Wireless Intrusion Detection System (WIDS).  ...  Dealing with this challenge, this paper proposes a holistic taxonomy of wireless security attacks from the perspective of the WIDS evaluator.  ...  One of the pivotal elements in wireless network security is the wireless intrusion detection system (WIDS) that is considered as a second line of defense for detecting any leaked attacks form the first  ... 
doi:10.5121/ijnsa.2012.4301 fatcat:kz6x5xo6g5agdkcqzswyy4gjcq

Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems [chapter]

Valerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D'Antonio, Jose Marti
2014 IFIP Advances in Information and Communication Technology  
The scenario considers an attack on a legacy SCADA system and wireless sensor network that reduces electricity production and degrades the services provided by the interdependent systems.  ...  The approach is based on the mixed holistic reductionist (MHR) methodology that models the relationships between functional components of critical infrastructures and the provided services.  ...  The information and communications technology components deployed include a network-based intrusion detection system (N-IDS) installed in the remote SCADA server facility, a host-based intrusion detection  ... 
doi:10.1007/978-3-662-45355-1_14 fatcat:4rntqfqka5eidmkn3px35jydna

A Survey of Intrusion Detection System

Wanda P
2020 International Journal of Informatics and Computation  
In this paper, we presented a survey on intrusion detection systems (IDS) in several areas.  ...  It consists of Web Application, Cloud Environment, Internet of Things (IoT), Mobile Ad-Hoc Network (MANET), Wireless Sensor Network (WSN) and Voice over Internet Protocol (VOIP)  ...  In Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks-2013, it is proposed that the application using data mining approaches for intrusion detection system in wireless sensor  ... 
doi:10.35842/ijicom.v1i1.7 fatcat:igdlmx2ctbfdlb7se5fagl2m34

Efficient Anomaly Detection for Smart Hospital IoT Systems

Abdel Mlak Said, Aymen Yahyaoui, Takoua Abdellatif
2021 Sensors  
In this paper, an Anomaly Detection System (ADS) is proposed in a smart hospital IoT system for detecting events of interest about patients' health and environment and, at the same time, for network intrusions  ...  The results show a high detection accuracy for both e-health related events and IoT network intrusions.  ...  For performance evaluation and to measure the scalability of the proposed system, A wireless sensor network simulator tool is used (Contiki Cooja simulator).  ... 
doi:10.3390/s21041026 pmid:33546169 fatcat:dj7vwqqrt5gmznjoi7c3456nsa

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

Junaid Arshad, Muhammad Ajmal Azad, Roohi Amad, Khaled Salah, Mamoun Alazab, Razi Iqbal
2020 Electronics  
Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems.  ...  Specifically, this paper presents a comprehensive study of existing intrusion detection systems for IoT systems in three aspects: computational overhead, energy consumption and privacy implications.  ...  .; Methodology and writing-review, M.A.A., K.S. and R.I.; Supervision, M.A. All authors have read and agreed to the published version of the manuscript.  ... 
doi:10.3390/electronics9040629 fatcat:6yqxhlzpp5fzxb7ornwz3iy5aq

A survivability model in wireless sensor networks

Sazia Parvin, Farookh Khadeer Hussain, Jong Sou Park, Dong Seong Kim
2012 Computers and Mathematics with Applications  
In this paper, we present a survivability evaluation model and analyze the performance of Wireless Sensor Networks (WSNs) under attack and key compromise.  ...  The compromised node can be identified by one of the intrusion detection mechanisms. After detecting the compromised node, the key in the node has to be revoked.  ...  by adversaries, which is detected by the Intrusion Detection System (IDS).  ... 
doi:10.1016/j.camwa.2012.02.027 fatcat:6qmolebhvzhnhkkfrebn4jab3e

Distributed and control theoretic approach to intrusion detection

Rahul Khanna, Huaping Liu
2007 Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07  
In this paper we discuss a control-theoretic Hidden Markov Model (HMM) strategy for intrusion detection using distributed observations across multiple nodes.  ...  Ad hoc wireless networks are more vulnerable to malicious attacks than traditional wired networks due to the silent nature of these attacks and the inability of the conventional intrusion detection systems  ...  INTRODUCTION Intrusion detection system (IDS) protects data integrity and manages the system availability during intrusion.  ... 
doi:10.1145/1280940.1280965 dblp:conf/iwcmc/KhannaL07 fatcat:yovnkxu645bcrmynslfknknbi4

A General Distributed Architecture for Resilient Monitoring over Heterogeneous Networks [chapter]

Fábio Januário, Alberto Cardoso, Paulo Gil
2014 IFIP Advances in Information and Communication Technology  
This work proposes a general distributed architecture, with supporting methods, for building a resilient monitoring system that can adaptively accommodate both cyber and physical anomalies.  ...  Its implementation relies on multi-agent systems within a distributed middleware.  ...  In [2] , a generalized design methodology was suggested for analysing and accommodating anomalies in cyber physical systems.  ... 
doi:10.1007/978-3-642-54734-8_15 fatcat:hhqxpujfxfd73fp46mcjb2n2le

Machine Learning for Anomaly Detection: A Systematic Review

Ali Bou Nassif, Manar Abu Talib, Qassim Nasir, Fatima Mohamad Dakalbab
2021 IEEE Access  
They add performance metrics and intrusion detection systems evaluation and provide a list of tools and research issues. It covers network anomaly detection in particular.  ...  Wireless Network" Jour. 2017 [166] A141 "Anomaly detection using machine learning with a case study" Conf. 2014 [167] A142 "Octopus-IIDS: An anomaly based intelligent intrusion detection system" Conf  ... 
doi:10.1109/access.2021.3083060 fatcat:vv7qthbvqjdz7ksm3yosulk22q

Poster abstract

Sachin Adlakha, Saurabh Ganeriwal, Curt Schurgers, Mani B. Srivastava
2003 Proceedings of the first international conference on Embedded networked sensor systems - SenSys '03  
for a specific practical application.  ...  With the growing interest in wireless sensor networks, techniques for their systematic analysis design and optimization are essential.  ...  More specifically, we consider a network for intrusion detection, whereby the individual nodes are deployed randomly.  ... 
doi:10.1145/958525.958528 fatcat:5phrc76bpvc6dlaevr4fvihkoy

Poster abstract

Sachin Adlakha, Saurabh Ganeriwal, Curt Schurgers, Mani B. Srivastava
2003 Proceedings of the first international conference on Embedded networked sensor systems - SenSys '03  
for a specific practical application.  ...  With the growing interest in wireless sensor networks, techniques for their systematic analysis design and optimization are essential.  ...  More specifically, we consider a network for intrusion detection, whereby the individual nodes are deployed randomly.  ... 
doi:10.1145/958491.958528 dblp:conf/sensys/AdlakhaGSS03 fatcat:uryi32yblrgj5mjdicebpfaf7q

Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic

Rodney Alexander
2020 Journal of Information Security  
Defense in depth (DiD) prevents network intrusions by deploying tools and procedures such as firewalls, access control and detection.  ...  Although implementation of technological solutions is the usual response to security threats and vulnerabilities, wireless security is primarily a management issue [4] .  ...  For example, if Trojans are a concern they should focus on firewalls and Network Intrusion Detection Systems (NIDS).  ... 
doi:10.4236/jis.2020.114017 fatcat:cdjl2ujxcvf3vjuncwfnfqrbn4

Towards a Framework for Assuring Cyber Physical System Security

Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li, Xiaoyan Zhang
2015 International Journal of Security and Its Applications  
For the past few years, researchers are focusing their researches on different aspects of security of cyber physical systems.  ...  Finally, a conclusion of this article is given. The prevalence and vulnerabilities of cyber physical systems draw the attention of both researchers and attackers.  ...  They develop two intrusion detection techniques for intrusion detection of malicious attacks in a CPS and utilize the hierarchical model developed to analyze the performance characteristics of these two  ... 
doi:10.14257/ijsia.2015.9.3.04 fatcat:asagegebibe43pnssbe6q7d42q
« Previous Showing results 1 — 15 out of 1,590 results