Towards distributed layered intrusion detection system for large scale wireless sensor networks

作者: Karen Medhat , Rabie A. Ramadan , Ihab Talkhan

DOI: 10.1504/IJIEI.2017.10003425

关键词:

摘要: In the current era of computer and communication rapid development, network security has become one most important factors to consider. Security considerations in wireless sensor networks (WSNs) have been an interesting point research especially with fast spread WSNs. this paper, efficient two-layer three-layer intrusion detection models are introduced. The model represents levels sink nodes. sensor, base station. elaborated examined through a set experiments. A supervised learning algorithm is introduced be used node layer unsupervised other layers. algorithms only 10% data for training gave high accuracy on dataset, using lesser number features compared approaches.

参考文章(27)
Heba F Eid, Ahmad Taher Azar, Aboul Ella Hassanien, None, Improved Real-Time Discretize Network Intrusion Detection System BIC-TA (1). pp. 99- 109 ,(2013) , 10.1007/978-81-322-1038-2_9
C G Priya, P Uday Babu, R Visakh, Survey on Intrusion Detection Techniques Using Data-Mining Domain International journal of engineering research and technology. ,vol. 3, ,(2014)
Amira Sayed A. Aziz, Ahmad Taher Azar, Aboul Ella Hassanien, Sanaa El-Ola Hanafy, Continuous Features Discretization for Anomaly Intrusion Detectors Generation Advances in Intelligent Systems and Computing. pp. 209- 221 ,(2014) , 10.1007/978-3-319-00930-8_19
Fernando Berzal, Juan-Carlos Cubero, Nicolás Marı́n, Daniel Sánchez, Building multi-way decision trees with numerical attributes Information Sciences. ,vol. 165, pp. 73- 90 ,(2004) , 10.1016/J.INS.2003.09.018
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skorić, Measuring intrusion detection capability Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06. pp. 90- 101 ,(2006) , 10.1145/1128817.1128834
Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Sensor network security: a survey IEEE Communications Surveys and Tutorials. ,vol. 11, pp. 52- 73 ,(2009) , 10.1109/SURV.2009.090205
Gulshan Kumar, Krishan Kumar, Design of an evolutionary approach for intrusion detection. The Scientific World Journal. ,vol. 2013, pp. 962185- 962185 ,(2013) , 10.1155/2013/962185
Bo Sun, Lawrence Osborne, Yang Xiao, Sghaier Guizani, Intrusion detection techniques in mobile ad hoc and wireless sensor networks IEEE Wireless Communications. ,vol. 14, pp. 56- 63 ,(2007) , 10.1109/MWC.2007.4396943
Muhammad Usama, Fahad T. Bin Muhaya, Framework for Secure Wireless Communication in Wireless Sensor Networks International Journal of Distributed Sensor Networks. ,vol. 9, pp. 585491- ,(2013) , 10.1155/2013/585491
D. Puccinelli, M. Haenggi, Wireless sensor networks: applications and challenges of ubiquitous sensing IEEE Circuits and Systems Magazine. ,vol. 5, pp. 19- 31 ,(2005) , 10.1109/MCAS.2005.1507522