2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883583
|View full text |Cite
|
Sign up to set email alerts
|

Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(48 citation statements)
references
References 13 publications
0
48
0
Order By: Relevance
“…[20] Man-in-the-middle Anomaly-based Simulation Centralized [21] Multiple Conventional attacks Signature-based ------ [22] Routing attack Specification-based Simulation Hybrid [23] DoS Specification-based Simulation -- [24] DoS Signature-based Empirical Centralized [25] Routing attack Anomaly-based Simulation Centralized [26] Routing attack Hybrid Simulation Hybrid [27] Multiple Conventional attacks Anomaly-based ---- [28] Multiple Conventional attacks Signature-based Hypothetical Centralized [29] Multiple Conventional attacks Specification-based Empirical Hybrid [30] Multiple Conventional attacks Signature-based Empirical Distributed [31] DoS Anomaly-based Simulation Distributed [32] Routing attack and MITM Hybrid Simulation [33] Routing attack Hybrid Simulation Distributed [34] Conventional Anomaly-based Empirical [35] Multiple Conventional attacks Anomaly-based ----Hybrid [36] Routing attack Anomaly-based Simulation Hybrid…”
Section: References Security Threat Detection Methods Validation Stratmentioning
confidence: 99%
“…[20] Man-in-the-middle Anomaly-based Simulation Centralized [21] Multiple Conventional attacks Signature-based ------ [22] Routing attack Specification-based Simulation Hybrid [23] DoS Specification-based Simulation -- [24] DoS Signature-based Empirical Centralized [25] Routing attack Anomaly-based Simulation Centralized [26] Routing attack Hybrid Simulation Hybrid [27] Multiple Conventional attacks Anomaly-based ---- [28] Multiple Conventional attacks Signature-based Hypothetical Centralized [29] Multiple Conventional attacks Specification-based Empirical Hybrid [30] Multiple Conventional attacks Signature-based Empirical Distributed [31] DoS Anomaly-based Simulation Distributed [32] Routing attack and MITM Hybrid Simulation [33] Routing attack Hybrid Simulation Distributed [34] Conventional Anomaly-based Empirical [35] Multiple Conventional attacks Anomaly-based ----Hybrid [36] Routing attack Anomaly-based Simulation Hybrid…”
Section: References Security Threat Detection Methods Validation Stratmentioning
confidence: 99%
“…However, a training phase for this approach is not required as it will work immediately once setting up specifications is finished. Additionally, specifying specifications manually could be error-prone and time-consuming as the system may find it hard to adjust with different domains [77].…”
Section: Statistical-based Methodsmentioning
confidence: 99%
“…In the clustered placement, the network is organized into clusters, where a cluster head is selected from each cluster, and deployed with the IDS agent. For example, the cluster heads can overhear and monitor their neighbor nodes' packet transmission [7]. A specification-based detection algorithm is then applied, where the overheard packets are compared to the abnormal behaviors (set of rules) which are manually defined.…”
Section: Intrusion Detection For Wireless Internet Of Thingsmentioning
confidence: 99%