Filters








12,744 Hits in 4.3 sec

Feedback Reliability Ratio of an Intrusion Detection System

Usha Banerjee, Gaurav Batra, K. V. Arya
2012 Journal of Information Security  
We propose a new metric called feedback reliability ratio for an intrusion detection system.  ...  In this paper we try to develop a novel metric to assess the performance of such intrusion detection systems under the influence of attacks.  ...  key dimensions of an intrusion detection system.  ... 
doi:10.4236/jis.2012.33030 fatcat:w5xl5hlu75fk5hbc2qz574opb4

A Reliable Research to Preserve Security in Infrastructure less Networks: MANET

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Here this problem is addressed using Intrusion detection mechanism (IDM) and Position-based Opportunistic Routing protocol (PORP) in a reliable and timely manner.  ...  Due to this nature of MANET there is a need to incorporate routing protocol with security mechanism.  ...  Fig 2 View of Intrusion detection system A.  ... 
doi:10.35940/ijitee.l1033.10812s219 fatcat:3upkinblsjfjzbpeexzbcv7cze

A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks

Q. Zhu, C. J. Fung, R. Boutaba, T. Basar
2010 2010 IEEE International Conference on Communications  
Collaborative intrusion detection networks are often used to gain better detection accuracy and cost efficiency as compared to a single host-based intrusion detection system (IDS).  ...  In this paper, we present a sequential hypothesis testing method for feedback aggregation for each individual IDS in the network.  ...  Intrusion detection is the process of monitoring and identifying attempted unauthorized system access or manipulation.  ... 
doi:10.1109/icc.2010.5501981 dblp:conf/icc/ZhuFBB10 fatcat:thnenff6urbsxcfbqsmhfmqwrq

A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks [article]

Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar
2010 arXiv   pre-print
Collaborative intrusion detection networks are often used to gain better detection accuracy and cost efficiency as compared to a single host-based intrusion detection system (IDS).  ...  In this paper, we present a sequential hypothesis testing method for feedback aggregation for each individual IDS in the net- work.  ...  Intrusion detection is the process of monitoring and identifying attempted unauthorized system access or manipulation.  ... 
arXiv:1002.3190v1 fatcat:qbl6a3cinvgpfetfnrbba5lxma

Intrusion Response System in AODV for MANET

Manoj Kumar, Akshay Girdhar
2010 International Journal of Computer Applications  
The mobile adhoc network (MANET) requires effective intrusion response system. In this paper, we present an intrusion response system that supports the infrastructureless nature of MANETs.  ...  Our results show that the proposed concept significantly improves the overall security of mobile ad hoc network without having geographical information of nodes.  ...  Ashok Kumar, Programmer, at GTBKIET Malout has been an immense help in carrying out the present work and is acknowledged with reverential thanks.  ... 
doi:10.5120/1298-1797 fatcat:t23d5tbrmfdelekzse5uspuwsy

Securing Multi-Path Routing Using Trust Management in Heterogeneous Wsn

B. Sathiyaprasad, C.L.Stefi Sterlin
2014 IOSR Journal of Computer Engineering  
The key concept of this paper is to maximize the system lifetime.  ...  Furthermore, a voting-based IDS algorithm is applied to detect malicious nodes in a heterogeneous wireless sensor network to analyze redundancy level in term of both source and path redundancy.  ...  Energy efficiency is achieved by IDS detection interval that can best balance intrusion accuracy vs. energy consumption due to intrusion detection activities, so as to maximize the system lifetime.  ... 
doi:10.9790/0661-16241118 fatcat:z5ah3wiv7fgmbjppbolckq5bly

An Intrusion Detection System for Internet of Medical Things

Geethapriya Thamilarasu, Adedayo Odesile, Andrew Hoang
2020 IEEE Access  
Feedback Reliability Ratio (FBR): The feedback reliability ratio is an inverse measure of the reliability of a machine learning based intrusion detection system [37] .  ...  The Feedback reliability value is a direct inverse representation of reliability of ML classification algorithm with respect to the data model.  ...  promising results in terms of accuracy. In our future research, we plan to further reduce device specific energy consumption of the detection system.  ... 
doi:10.1109/access.2020.3026260 fatcat:7o3l4qo2bbhkxmh2yvmbcilpfm

A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET

Rashmi Ahlawat, Setu K Chaturvedi
2013 International Journal of Computer Applications  
In this paper we perform an analysis of various schemes that can be applied to improve the performance of MANET when a black hole attack occurs and provide a solution using anomaly based IDS scheme.  ...  A wireless communication system which do not require any fixed infrastructure for the establishment of its configuration is called Mobile Adhoc Network(MANET).This infrastructure leads to the misbehavior  ...  An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents.  ... 
doi:10.5120/13827-1577 fatcat:7dhqkhaignfytdjiwfv4p4bgii

Intelligent Network Intrusion Prevention Feature Collection and Classification Algorithms

Deepaa Selva, Balakrishnan Nagaraj, Danil Pelusi, Rajendran Arunkumar, Ajay Nair
2021 Algorithms  
a survey into the current smart techniques for intrusion detection systems.  ...  Rapid Internet use growth and applications of diverse military have managed researchers to develop smart systems to help applications and users achieve the facilities through the provision of required  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/a14080224 fatcat:mfxnexpgo5btxcbidvh7xiy3l4

Enhanced routing for secured ad-hoc network

U Kumaran, A Ramachandran, J Jegan, E.K. Subramanian
2020 Indonesian Journal of Electrical Engineering and Computer Science  
As there is no fixed frame for this system, usage of available resources for reliable communication is a great challenge for MANETs.  ...  Dropping of packets maliciously in an attack is known as black hole attack.An attempt is made in this paper to detect dynamically using the security of cross layer called as honeypot and classify the mechanisms  ...  The significant part of the security system is the detection of intrusion which detects the security policy violation by the activities of the monitoring system to remove unwanted disturbances.  ... 
doi:10.11591/ijeecs.v19.i2.pp949-956 fatcat:ytbfhkt6gfftvddg5uiq2rgsma

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

Jie Yuan, Erxia Li, Chaoqun Kang, Fangyuan Chang, Xiaoyong Li
2019 Information  
detection.  ...  and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion  ...  : The authors would like to convey their heartfelt gratitude to the reviewers and the Editor for the valuable suggestions and important comments, which greatly helped them to improve the presentation of  ... 
doi:10.3390/info10080259 fatcat:zu5n2i3enjczxbbkhr2x3ptg54

An energy ratio feature extraction method for optical fiber vibration signal

Zhiyong Sheng, Xinyan Zhang, Yanping Wang, Weiming Hou, Dan Yang
2017 Photonic Sensors  
In this paper, an energy ratio feature extraction method of harmful intrusion event is drawn on. Firstly, the intrusion signals are pre-processed and the power spectral density (PSD) is calculated.  ...  Then, the energy ratio of different frequency bands is calculated, and the corresponding feature vector of each type of intrusion event is further formed.  ...  Besides, for concurrent intrusions, the detection performance of the system based on M-Z interferometer will decline badly [7] , which further limits the application of the system in the scene.  ... 
doi:10.1007/s13320-017-0478-1 fatcat:rmkgfovbd5fs7nwp6y42dpxybu

Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

H. Al-Hamadi, Ing-Ray Chen
2013 IEEE Transactions on Network and Service Management  
The key concept of our redundancy management is to exploit the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize the system useful lifetime.  ...  We develop a novel probability model to analyze the best redundancy level in terms of path redundancy and source redundancy, as well as the best intrusion detection settings in terms of the number of voters  ...  Thus, very likely the system would employ an intrusion detection system (IDS) with the goal to detect and remove malicious nodes.  ... 
doi:10.1109/tnsm.2013.043013.120282 fatcat:lyggfpa44bhtxdda5evevjmglm

Detection and Isolation of Packet Dropping Attacker in MANETs

Ahmed Mohamed, Ahmad H., Imane Aly, Amira Kotb
2013 International Journal of Advanced Computer Science and Applications  
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs).  ...  The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.  ...  Briefly, an intrusion detection system monitors activity in a system or network in order to identify, to detect, and then to isolate current attacks.  ... 
doi:10.14569/ijacsa.2013.040405 fatcat:cudm2hu6fba6tbusm5mlfkdccq

A New FLAME Selection Method for Intrusion Detection (FLAME-ID)

Wafa Alsharafat
2019 Communications and Network  
Due to the ever growing number of cyber attacks, especially of the online systems, development and operation of adaptive Intrusion Detection Systems (IDSs) is badly needed so as to protect these systems  ...  whether the incoming message is a normal request or an intrusion.  ...  One of such rules is the XCS, which is one of the classifier systems that are categorized as rule-based systems that are employed for detecting intrusions.  ... 
doi:10.4236/cn.2019.111002 fatcat:uelgjsv7tzhfjp4vzlbvliqiha
« Previous Showing results 1 — 15 out of 12,744 results