2013
DOI: 10.1016/j.ins.2011.03.014
|View full text |Cite
|
Sign up to set email alerts
|

Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(21 citation statements)
references
References 13 publications
0
21
0
Order By: Relevance
“…The proposed IHIDS can achieve a high detection rate and low false positive rate and it also learns about new attacks on the IDS using ART [39]. Based on incorporating the learning mechanism in IDS, [31] has also proposed a new model that uses Markovian IDS to protect sensor nodes from attack. It integrates Anomaly based, Misuse based and game theory to prevent malicious attacks.…”
Section: Fig 3 Hybrid Based Idsmentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed IHIDS can achieve a high detection rate and low false positive rate and it also learns about new attacks on the IDS using ART [39]. Based on incorporating the learning mechanism in IDS, [31] has also proposed a new model that uses Markovian IDS to protect sensor nodes from attack. It integrates Anomaly based, Misuse based and game theory to prevent malicious attacks.…”
Section: Fig 3 Hybrid Based Idsmentioning
confidence: 99%
“…In the hybrid based IDS, a different scenario exists as the machine learning algorithms are the widely preferred methods, which includes ART, Q-learning, SVM, SLIPPER, CSOACN, etc. The proposed models incorporating machine learning methods are [26,28,29,31] and [33]. In papers [26,33], SVM is used for detecting intrusions and in [33], CSOACN is used along with SVM to provide a dual layer of intrusion detection.…”
Section: Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…The security of WSN for those crucial fields has been an important demand [4]. Since wireless sensor nodes usually are limited by power supply, computation capability and communication range [5], traditional encryption/decryption techniques that require an uninterrupted power supply to retain frequently key management and access control are unrealistic to be applied to WSN [6]. Thus, establishing an intrusion detection system (IDS) to meet the security requirements in WSN is essential.…”
Section: Introductionmentioning
confidence: 99%
“…In order to protect sensor nodes from malicious attacks, Huang et al proposed a new intrusion detection method. The method constructed Markov decision processes based on an attack pattern mining in order to predict future attack patterns and implement appropriate measures [26]. In order to explore, analyze, and extract useful information and knowledge from the larger number of personal data which came from smartphone and wearable devices, Muhammad et al proposed the personal ecosystem where all computational resources, communication facilities, storage and knowledge management systems are available in user proximity [27].…”
Section: Introductionmentioning
confidence: 99%