A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Exploring Cross-layer techniques for Security: Challenges and Opportunities in Wireless Networks
2007
MILCOM 2007 - IEEE Military Communications Conference
To this end, we evaluate different cross-layer architectures and analyze their efficiency in intrusion detection systems. ...
In this paper, we discuss the challenges and opportunities of using cross-layer techniques for enhancing wireless network security. ...
Cross-layer IDS based on Direct Per-layer Interactions (Type I) We have developed a Type I intrusion detection system for improved detection and better evaluation of malicious activity in the network. ...
doi:10.1109/milcom.2007.4454962
fatcat:jxnhzq2idnbx3p7monmcljru2y
Systematic Literature Review over IDPS, Classification and Application in its Different Areas
2021
STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH
Anomaly-based Intrusion Detection Systems (AIDS). ...
Presenting a classification of network anomaly IDS evaluation metrics and discussion on the importance of the feature selection. ...
Acknowledgement Authors are thankful to the Editorial Team for their constructive support. ...
doi:10.52700/scir.v3i2.58
fatcat:xrczlxjg5ncclf2ftxyw3y5zce
Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems
2012
International journal of network security and its applications
the form of Wireless Intrusion Detection System (WIDS). ...
Dealing with this challenge, this paper proposes a holistic taxonomy of wireless security attacks from the perspective of the WIDS evaluator. ...
One of the pivotal elements in wireless network security is the wireless intrusion detection system (WIDS) that is considered as a second line of defense for detecting any leaked attacks form the first ...
doi:10.5121/ijnsa.2012.4301
fatcat:kz6x5xo6g5agdkcqzswyy4gjcq
Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems
[chapter]
2014
IFIP Advances in Information and Communication Technology
The scenario considers an attack on a legacy SCADA system and wireless sensor network that reduces electricity production and degrades the services provided by the interdependent systems. ...
The approach is based on the mixed holistic reductionist (MHR) methodology that models the relationships between functional components of critical infrastructures and the provided services. ...
The information and communications technology components deployed include a network-based intrusion detection system (N-IDS) installed in the remote SCADA server facility, a host-based intrusion detection ...
doi:10.1007/978-3-662-45355-1_14
fatcat:4rntqfqka5eidmkn3px35jydna
A Survey of Intrusion Detection System
2020
International Journal of Informatics and Computation
In this paper, we presented a survey on intrusion detection systems (IDS) in several areas. ...
It consists of Web Application, Cloud Environment, Internet of Things (IoT), Mobile Ad-Hoc Network (MANET), Wireless Sensor Network (WSN) and Voice over Internet Protocol (VOIP) ...
In Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks-2013, it is proposed that the application using data mining approaches for intrusion detection system in wireless sensor ...
doi:10.35842/ijicom.v1i1.7
fatcat:igdlmx2ctbfdlb7se5fagl2m34
Efficient Anomaly Detection for Smart Hospital IoT Systems
2021
Sensors
In this paper, an Anomaly Detection System (ADS) is proposed in a smart hospital IoT system for detecting events of interest about patients' health and environment and, at the same time, for network intrusions ...
The results show a high detection accuracy for both e-health related events and IoT network intrusions. ...
For performance evaluation and to measure the scalability of the proposed system, A wireless sensor network simulator tool is used (Contiki Cooja simulator). ...
doi:10.3390/s21041026
pmid:33546169
fatcat:dj7vwqqrt5gmznjoi7c3456nsa
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT
2020
Electronics
Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems. ...
Specifically, this paper presents a comprehensive study of existing intrusion detection systems for IoT systems in three aspects: computational overhead, energy consumption and privacy implications. ...
.; Methodology and writing-review, M.A.A., K.S. and R.I.; Supervision, M.A. All authors have read and agreed to the published version of the manuscript. ...
doi:10.3390/electronics9040629
fatcat:6yqxhlzpp5fzxb7ornwz3iy5aq
A survivability model in wireless sensor networks
2012
Computers and Mathematics with Applications
In this paper, we present a survivability evaluation model and analyze the performance of Wireless Sensor Networks (WSNs) under attack and key compromise. ...
The compromised node can be identified by one of the intrusion detection mechanisms. After detecting the compromised node, the key in the node has to be revoked. ...
by adversaries, which is detected by the Intrusion Detection System (IDS). ...
doi:10.1016/j.camwa.2012.02.027
fatcat:6qmolebhvzhnhkkfrebn4jab3e
Distributed and control theoretic approach to intrusion detection
2007
Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07
In this paper we discuss a control-theoretic Hidden Markov Model (HMM) strategy for intrusion detection using distributed observations across multiple nodes. ...
Ad hoc wireless networks are more vulnerable to malicious attacks than traditional wired networks due to the silent nature of these attacks and the inability of the conventional intrusion detection systems ...
INTRODUCTION Intrusion detection system (IDS) protects data integrity and manages the system availability during intrusion. ...
doi:10.1145/1280940.1280965
dblp:conf/iwcmc/KhannaL07
fatcat:yovnkxu645bcrmynslfknknbi4
A General Distributed Architecture for Resilient Monitoring over Heterogeneous Networks
[chapter]
2014
IFIP Advances in Information and Communication Technology
This work proposes a general distributed architecture, with supporting methods, for building a resilient monitoring system that can adaptively accommodate both cyber and physical anomalies. ...
Its implementation relies on multi-agent systems within a distributed middleware. ...
In [2] , a generalized design methodology was suggested for analysing and accommodating anomalies in cyber physical systems. ...
doi:10.1007/978-3-642-54734-8_15
fatcat:hhqxpujfxfd73fp46mcjb2n2le
Machine Learning for Anomaly Detection: A Systematic Review
2021
IEEE Access
They add performance metrics and intrusion detection systems evaluation and provide a list of tools and research issues. It covers network anomaly detection in particular. ...
Wireless Network" Jour. 2017 [166] A141 "Anomaly detection using machine learning with a case study" Conf. 2014 [167] A142 "Octopus-IIDS: An anomaly based intelligent intrusion detection system" Conf ...
doi:10.1109/access.2021.3083060
fatcat:vv7qthbvqjdz7ksm3yosulk22q
Poster abstract
2003
Proceedings of the first international conference on Embedded networked sensor systems - SenSys '03
for a specific practical application. ...
With the growing interest in wireless sensor networks, techniques for their systematic analysis design and optimization are essential. ...
More specifically, we consider a network for intrusion detection, whereby the individual nodes are deployed randomly. ...
doi:10.1145/958525.958528
fatcat:5phrc76bpvc6dlaevr4fvihkoy
Poster abstract
2003
Proceedings of the first international conference on Embedded networked sensor systems - SenSys '03
for a specific practical application. ...
With the growing interest in wireless sensor networks, techniques for their systematic analysis design and optimization are essential. ...
More specifically, we consider a network for intrusion detection, whereby the individual nodes are deployed randomly. ...
doi:10.1145/958491.958528
dblp:conf/sensys/AdlakhaGSS03
fatcat:uryi32yblrgj5mjdicebpfaf7q
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
2020
Journal of Information Security
Defense in depth (DiD) prevents network intrusions by deploying tools and procedures such as firewalls, access control and detection. ...
Although implementation of technological solutions is the usual response to security threats and vulnerabilities, wireless security is primarily a management issue [4] . ...
For example, if Trojans are a concern they should focus on firewalls and Network Intrusion Detection Systems (NIDS). ...
doi:10.4236/jis.2020.114017
fatcat:cdjl2ujxcvf3vjuncwfnfqrbn4
Towards a Framework for Assuring Cyber Physical System Security
2015
International Journal of Security and Its Applications
For the past few years, researchers are focusing their researches on different aspects of security of cyber physical systems. ...
Finally, a conclusion of this article is given. The prevalence and vulnerabilities of cyber physical systems draw the attention of both researchers and attackers. ...
They develop two intrusion detection techniques for intrusion detection of malicious attacks in a CPS and utilize the hierarchical model developed to analyze the performance characteristics of these two ...
doi:10.14257/ijsia.2015.9.3.04
fatcat:asagegebibe43pnssbe6q7d42q
« Previous
Showing results 1 — 15 out of 1,590 results