A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Feedback Reliability Ratio of an Intrusion Detection System
2012
Journal of Information Security
We propose a new metric called feedback reliability ratio for an intrusion detection system. ...
In this paper we try to develop a novel metric to assess the performance of such intrusion detection systems under the influence of attacks. ...
key dimensions of an intrusion detection system. ...
doi:10.4236/jis.2012.33030
fatcat:w5xl5hlu75fk5hbc2qz574opb4
A Reliable Research to Preserve Security in Infrastructure less Networks: MANET
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Here this problem is addressed using Intrusion detection mechanism (IDM) and Position-based Opportunistic Routing protocol (PORP) in a reliable and timely manner. ...
Due to this nature of MANET there is a need to incorporate routing protocol with security mechanism. ...
Fig 2 View of Intrusion detection system
A. ...
doi:10.35940/ijitee.l1033.10812s219
fatcat:3upkinblsjfjzbpeexzbcv7cze
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks
2010
2010 IEEE International Conference on Communications
Collaborative intrusion detection networks are often used to gain better detection accuracy and cost efficiency as compared to a single host-based intrusion detection system (IDS). ...
In this paper, we present a sequential hypothesis testing method for feedback aggregation for each individual IDS in the network. ...
Intrusion detection is the process of monitoring and identifying attempted unauthorized system access or manipulation. ...
doi:10.1109/icc.2010.5501981
dblp:conf/icc/ZhuFBB10
fatcat:thnenff6urbsxcfbqsmhfmqwrq
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks
[article]
2010
arXiv
pre-print
Collaborative intrusion detection networks are often used to gain better detection accuracy and cost efficiency as compared to a single host-based intrusion detection system (IDS). ...
In this paper, we present a sequential hypothesis testing method for feedback aggregation for each individual IDS in the net- work. ...
Intrusion detection is the process of monitoring and identifying attempted unauthorized system access or manipulation. ...
arXiv:1002.3190v1
fatcat:qbl6a3cinvgpfetfnrbba5lxma
Intrusion Response System in AODV for MANET
2010
International Journal of Computer Applications
The mobile adhoc network (MANET) requires effective intrusion response system. In this paper, we present an intrusion response system that supports the infrastructureless nature of MANETs. ...
Our results show that the proposed concept significantly improves the overall security of mobile ad hoc network without having geographical information of nodes. ...
Ashok Kumar, Programmer, at GTBKIET Malout has been an immense help in carrying out the present work and is acknowledged with reverential thanks. ...
doi:10.5120/1298-1797
fatcat:t23d5tbrmfdelekzse5uspuwsy
Securing Multi-Path Routing Using Trust Management in Heterogeneous Wsn
2014
IOSR Journal of Computer Engineering
The key concept of this paper is to maximize the system lifetime. ...
Furthermore, a voting-based IDS algorithm is applied to detect malicious nodes in a heterogeneous wireless sensor network to analyze redundancy level in term of both source and path redundancy. ...
Energy efficiency is achieved by IDS detection interval that can best balance intrusion accuracy vs. energy consumption due to intrusion detection activities, so as to maximize the system lifetime. ...
doi:10.9790/0661-16241118
fatcat:z5ah3wiv7fgmbjppbolckq5bly
An Intrusion Detection System for Internet of Medical Things
2020
IEEE Access
Feedback Reliability Ratio (FBR): The feedback reliability ratio is an inverse measure of the reliability of a machine learning based intrusion detection system [37] . ...
The Feedback reliability value is a direct inverse representation of reliability of ML classification algorithm with respect to the data model. ...
promising results in terms of accuracy. In our future research, we plan to further reduce device specific energy consumption of the detection system. ...
doi:10.1109/access.2020.3026260
fatcat:7o3l4qo2bbhkxmh2yvmbcilpfm
A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET
2013
International Journal of Computer Applications
In this paper we perform an analysis of various schemes that can be applied to improve the performance of MANET when a black hole attack occurs and provide a solution using anomaly based IDS scheme. ...
A wireless communication system which do not require any fixed infrastructure for the establishment of its configuration is called Mobile Adhoc Network(MANET).This infrastructure leads to the misbehavior ...
An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. ...
doi:10.5120/13827-1577
fatcat:7dhqkhaignfytdjiwfv4p4bgii
Intelligent Network Intrusion Prevention Feature Collection and Classification Algorithms
2021
Algorithms
a survey into the current smart techniques for intrusion detection systems. ...
Rapid Internet use growth and applications of diverse military have managed researchers to develop smart systems to help applications and users achieve the facilities through the provision of required ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/a14080224
fatcat:mfxnexpgo5btxcbidvh7xiy3l4
Enhanced routing for secured ad-hoc network
2020
Indonesian Journal of Electrical Engineering and Computer Science
As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs. ...
Dropping of packets maliciously in an attack is known as black hole attack.An attempt is made in this paper to detect dynamically using the security of cross layer called as honeypot and classify the mechanisms ...
The significant part of the security system is the detection of intrusion which detects the security policy violation by the activities of the monitoring system to remove unwanted disturbances. ...
doi:10.11591/ijeecs.v19.i2.pp949-956
fatcat:ytbfhkt6gfftvddg5uiq2rgsma
Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing
2019
Information
detection. ...
and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion ...
: The authors would like to convey their heartfelt gratitude to the reviewers and the Editor for the valuable suggestions and important comments, which greatly helped them to improve the presentation of ...
doi:10.3390/info10080259
fatcat:zu5n2i3enjczxbbkhr2x3ptg54
An energy ratio feature extraction method for optical fiber vibration signal
2017
Photonic Sensors
In this paper, an energy ratio feature extraction method of harmful intrusion event is drawn on. Firstly, the intrusion signals are pre-processed and the power spectral density (PSD) is calculated. ...
Then, the energy ratio of different frequency bands is calculated, and the corresponding feature vector of each type of intrusion event is further formed. ...
Besides, for concurrent intrusions, the detection performance of the system based on M-Z interferometer will decline badly [7] , which further limits the application of the system in the scene. ...
doi:10.1007/s13320-017-0478-1
fatcat:rmkgfovbd5fs7nwp6y42dpxybu
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
2013
IEEE Transactions on Network and Service Management
The key concept of our redundancy management is to exploit the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize the system useful lifetime. ...
We develop a novel probability model to analyze the best redundancy level in terms of path redundancy and source redundancy, as well as the best intrusion detection settings in terms of the number of voters ...
Thus, very likely the system would employ an intrusion detection system (IDS) with the goal to detect and remove malicious nodes. ...
doi:10.1109/tnsm.2013.043013.120282
fatcat:lyggfpa44bhtxdda5evevjmglm
Detection and Isolation of Packet Dropping Attacker in MANETs
2013
International Journal of Advanced Computer Science and Applications
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). ...
The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic. ...
Briefly, an intrusion detection system monitors activity in a system or network in order to identify, to detect, and then to isolate current attacks. ...
doi:10.14569/ijacsa.2013.040405
fatcat:cudm2hu6fba6tbusm5mlfkdccq
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
2019
Communications and Network
Due to the ever growing number of cyber attacks, especially of the online systems, development and operation of adaptive Intrusion Detection Systems (IDSs) is badly needed so as to protect these systems ...
whether the incoming message is a normal request or an intrusion. ...
One of such rules is the XCS, which is one of the classifier systems that are categorized as rule-based systems that are employed for detecting intrusions. ...
doi:10.4236/cn.2019.111002
fatcat:uelgjsv7tzhfjp4vzlbvliqiha
« Previous
Showing results 1 — 15 out of 12,744 results