2015
DOI: 10.1016/j.procs.2015.05.108
|View full text |Cite
|
Sign up to set email alerts
|

A Global Hybrid Intrusion Detection System for Wireless Sensor Networks

Abstract: Many researchers are currently focusing on the security of wireless sensor networks (WSNs). This type of network is associated with vulnerable characteristics such as open-air transmission and self-organizing without a fixed infrastructure. Intrusion Detection Systems (IDSs) can play an important role in detecting and preventing security attacks. In this paper, we propose a hybrid, lightweight intrusion detection system for sensor networks. Our intrusion detection model takes advantage of cluster-based archite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
36
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 81 publications
(39 citation statements)
references
References 11 publications
0
36
0
Order By: Relevance
“…Maleh et al (2015) [7], used support vector machine (SVM) algorithm for IDS which included a learning algorithm and for detecting malicious behaviours and lightweight IDS, which is based on attack signatures. Simulation results showed lower false alarm, high detection rate and can efficiently detect abnormal events.…”
Section: Figure 2 Intrusion Detection Techniques For Wireless Networmentioning
confidence: 99%
“…Maleh et al (2015) [7], used support vector machine (SVM) algorithm for IDS which included a learning algorithm and for detecting malicious behaviours and lightweight IDS, which is based on attack signatures. Simulation results showed lower false alarm, high detection rate and can efficiently detect abnormal events.…”
Section: Figure 2 Intrusion Detection Techniques For Wireless Networmentioning
confidence: 99%
“…Bezemskij et al [14] proposed a method based on Bayesian networks, which could not only determine whether a robot was attacked, but also determine whether the attack came from the cyber-domain or the physical-domain. Maleh et al [15] maked use of a support vector machine (SVM) algorithm to detect the presence of malicious behavior through a set of signature rule anomaly detection and provided global lightweight IDS. Subsequently, Jones et al [16] proposed a two-level intrusion detection system, consisting of a signature detection component and an anomaly detection component, where the anomaly detection component trained through a deep neural network (DNN) to detect commands that deviated from expected behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…It is not that only the wired networks suffer from the malicious activities, but the wireless sensor networks (WSNs) also suffer from them more prominently due to their open‐air transmission and self‐organizing architecture. Maleh et al discuss a hybrid lightweight IDS for protecting the WSNs by using the cluster‐based topology that requires less communication cost. Santoro et al design a hybrid IDS for WSNs to identify the virtual jamming attack.…”
Section: Introductionmentioning
confidence: 99%