+

Sadeghizadeh et al., 2018 - Google Patents

A lightweight intrusion detection system based on specifications to improve security in wireless sensor networks

Sadeghizadeh et al., 2018

View PDF
Document ID
13235925317935121404
Author
Sadeghizadeh M
Marouzi O
Publication year
Publication venue
Journal of Communication Engineering

External Links

Snippet

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered …
Continue reading at journals.shahed.ac.ir (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks

Similar Documents

Publication Publication Date Title
Benkhelifa et al. A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems
Wazid et al. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
Can et al. A survey of intrusion detection systems in wireless sensor networks
Nadeem et al. A survey of MANET intrusion detection & prevention approaches for network layer attacks
Satria A survey on MANET intrusion detection
Sedjelmaci et al. An efficient intrusion detection framework in cluster‐based wireless sensor networks
Vaccari et al. Remotely exploiting at command attacks on zigbee networks
Alzubaidi et al. Hybrid monitoring technique for detecting abnormal behaviour in rpl-based network.
Choudhary et al. Cluster-based intrusion detection method for internet of things
Khan et al. Framework for intrusion detection in IEEE 802.11 wireless mesh networks.
Alzubaidi et al. Neighbor-passive monitoring technique for detecting sinkhole attacks in RPL networks
Jatti et al. Intrusion detection systems
Kumar et al. A survey of the design and security mechanisms of the wireless networks and mobile Ad-Hoc networks
Singh et al. An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes
Khan et al. Exploiting Blockchain and RMCV‐Based Malicious Node Detection in ETD‐LEACH for Wireless Sensor Networks
Al-Na'amneh et al. Dis flooding attack impact in rpl-based 6lowpan network
Sadeghizadeh et al. A lightweight intrusion detection system based on specifications to improve security in wireless sensor networks
Liu Resilient cluster formation for sensor networks
Noureldien A novel taxonomy of MANET attacks
Selvamani et al. A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks
Anwar et al. Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks
Nordin et al. Cross-layer based intrusion detection system for wireless sensor networks: challenges, solutions, and future directions
Mujtaba et al. Enhancement of accuracy of the rank inconsistency detection algorithm
Sonekar et al. An Algorithmic Approach to Intrusion Detection in Ad Hoc Wireless Networks Based on Artificial Intelligence
Karmore et al. Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载