Sadeghizadeh et al., 2018 - Google Patents
A lightweight intrusion detection system based on specifications to improve security in wireless sensor networksSadeghizadeh et al., 2018
View PDF- Document ID
- 13235925317935121404
- Author
- Sadeghizadeh M
- Marouzi O
- Publication year
- Publication venue
- Journal of Communication Engineering
External Links
Snippet
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered …
- 238000001514 detection method 0 title abstract description 79
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Benkhelifa et al. | A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems | |
| Wazid et al. | Design of sinkhole node detection mechanism for hierarchical wireless sensor networks | |
| Can et al. | A survey of intrusion detection systems in wireless sensor networks | |
| Nadeem et al. | A survey of MANET intrusion detection & prevention approaches for network layer attacks | |
| Satria | A survey on MANET intrusion detection | |
| Sedjelmaci et al. | An efficient intrusion detection framework in cluster‐based wireless sensor networks | |
| Vaccari et al. | Remotely exploiting at command attacks on zigbee networks | |
| Alzubaidi et al. | Hybrid monitoring technique for detecting abnormal behaviour in rpl-based network. | |
| Choudhary et al. | Cluster-based intrusion detection method for internet of things | |
| Khan et al. | Framework for intrusion detection in IEEE 802.11 wireless mesh networks. | |
| Alzubaidi et al. | Neighbor-passive monitoring technique for detecting sinkhole attacks in RPL networks | |
| Jatti et al. | Intrusion detection systems | |
| Kumar et al. | A survey of the design and security mechanisms of the wireless networks and mobile Ad-Hoc networks | |
| Singh et al. | An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes | |
| Khan et al. | Exploiting Blockchain and RMCV‐Based Malicious Node Detection in ETD‐LEACH for Wireless Sensor Networks | |
| Al-Na'amneh et al. | Dis flooding attack impact in rpl-based 6lowpan network | |
| Sadeghizadeh et al. | A lightweight intrusion detection system based on specifications to improve security in wireless sensor networks | |
| Liu | Resilient cluster formation for sensor networks | |
| Noureldien | A novel taxonomy of MANET attacks | |
| Selvamani et al. | A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks | |
| Anwar et al. | Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks | |
| Nordin et al. | Cross-layer based intrusion detection system for wireless sensor networks: challenges, solutions, and future directions | |
| Mujtaba et al. | Enhancement of accuracy of the rank inconsistency detection algorithm | |
| Sonekar et al. | An Algorithmic Approach to Intrusion Detection in Ad Hoc Wireless Networks Based on Artificial Intelligence | |
| Karmore et al. | Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining |