2019
DOI: 10.35940/ijrte.b1540.0982s1119
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection Systems

Abstract: Intrusion Detection System is competent to detect the intrusions and alerting the administrator of system about the signs of possible intrusions. This paper presents a detailed review of the intrusion detection techniques used in WSNs. More specifically, the existing methods for blackhole and sinkhole attacks detection are reviewed. However, it is noted that most intrusion detection schemes proposed in the literature are either inefficient or have low detection rates/high false positive rates. This survey also… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 49 publications
0
1
0
Order By: Relevance
“…However, this basic security is not always appropriate, and advanced security mechanisms are needed. For example, the primary security mechanisms do not include protection against network-based attacks and do not allow monitoring whether a system has been exploited or tampered (Brown & Heikki, 2005;Jatti & Kishor Sontif, 2019;Liao et al, 2013). Some authors recommend implementing network intrusion detection systems (NIDSs) as the first choice for detecting network-based attacks (Debar et al, 2000;El-Bakry & Mastorakis, 2008).…”
Section: Rsp Securitymentioning
confidence: 99%
“…However, this basic security is not always appropriate, and advanced security mechanisms are needed. For example, the primary security mechanisms do not include protection against network-based attacks and do not allow monitoring whether a system has been exploited or tampered (Brown & Heikki, 2005;Jatti & Kishor Sontif, 2019;Liao et al, 2013). Some authors recommend implementing network intrusion detection systems (NIDSs) as the first choice for detecting network-based attacks (Debar et al, 2000;El-Bakry & Mastorakis, 2008).…”
Section: Rsp Securitymentioning
confidence: 99%