메뉴 건너뛰기




Volumn 6074 LNCS, Issue , 2010, Pages 192-203

Anomaly-based intrusion detection algorithms for wireless networks

Author keywords

Cumulative sum algorithms; Intrusion detection; Jamming; Performance evaluation; Signal to noise ratio; Simple threshold algorithms

Indexed keywords

ANOMALY-BASED INTRUSION DETECTION; CHANGE POINT DETECTION; CUMULATIVE SUM ALGORITHMS; CUMULATIVE SUMS; DETECTION PROBABILITIES; DETECTION THRESHOLD; FALSE ALARM RATE; PERFORMANCE EVALUATION; PHYSICAL LAYERS; SNR VALUES; STATISTICAL CHARACTERISTICS; THRESHOLD ALGORITHMS;

EID: 77953786464     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13315-2_16     Document Type: Conference Paper
Times cited : (14)

References (17)
  • 1
    • 84921889780 scopus 로고    scopus 로고
    • Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    • Elsevier, Amsterdam (September)
    • Bicacki, K., Tavli, B.: Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. In: Computer Standards and Interfaces. Elsevier, Amsterdam (September 2008)
    • (2008) Computer Standards and Interfaces
    • Bicacki, K.1    Tavli, B.2
  • 2
    • 47949091481 scopus 로고    scopus 로고
    • Jamming Vulnerabilities of IEEE 802.11e
    • IEEE, Los Alamitos (October)
    • Thuente, D., Newlin, B., Acharya, M.: Jamming Vulnerabilities of IEEE 802.11e. In: Proc. of MilCom 2007, pp. 1-7. IEEE, Los Alamitos (October 2007)
    • (2007) Proc. of MilCom 2007 , pp. 1-7
    • Thuente, D.1    Newlin, B.2    Acharya, M.3
  • 3
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • 41-47 (May)
    • Wenyuan, X., Ke, M., Trappe, W., Yanyong, Z.: Jamming sensor networks: attack and defense strategies. IEEE Network, 41-47 (May 2006)
    • (2006) IEEE Network
    • Wenyuan, X.1    Ke, M.2    Trappe, W.3    Yanyong, Z.4
  • 4
    • 33847392537 scopus 로고    scopus 로고
    • Effect of pulse jamming on IEEE 802.11 wireless LAN performance
    • IEEE, Los Alamitos (October)
    • Hall, M., Silvennoinen, A., Haggman, S.: Effect of pulse jamming on IEEE 802.11 wireless LAN performance. In: Proc. of MilCom 2005, pp. 2301-2306. IEEE, Los Alamitos (October 2005)
    • (2005) Proc. of MilCom 2005 , pp. 2301-2306
    • Hall, M.1    Silvennoinen, A.2    Haggman, S.3
  • 7
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • (May)
    • Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proc. of ACM MobiHoc (May 2005)
    • (2005) Proc. of ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 8
    • 35148872165 scopus 로고    scopus 로고
    • A Cross-layer approach to detect jamming attacks in wireless ad hoc networks
    • Washington DC, USA, October 2006
    • Thamilarasu, M., Mishra, S., Sridhar, R.: A Cross-layer approach to detect jamming attacks in wireless ad hoc networks. In: Proc. of Milcom 2006, Washington DC, USA, October 2006, pp. 1-7 (2006)
    • (2006) Proc. of Milcom 2006 , pp. 1-7
    • Thamilarasu, M.1    Mishra, S.2    Sridhar, R.3
  • 10
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • Bhuse, V., Gupta, A.: Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks, 33-51 (2006)
    • (2006) Journal of High Speed Networks , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 11
    • 33748965525 scopus 로고    scopus 로고
    • MOJO: A distributed physical layer anomaly detection system for 802.11 WLANs
    • Sheth, A., Doerr, C., Grunwald, D., Han, R., Sicker, D.: MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. In: ACM MobiSys (2006)
    • (2006) ACM MobiSys
    • Sheth, A.1    Doerr, C.2    Grunwald, D.3    Han, R.4    Sicker, D.5
  • 14
    • 84925338777 scopus 로고    scopus 로고
    • Distributed change-point detection of DDoS Attacks: Experimental results on DETER testbed
    • (August)
    • Chen, Y., Hwang, K., Ku, W.: Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed. In: Proc. of USENIX Security Symposium, Boston, USA (August 2007)
    • (2007) Proc. of USENIX Security Symposium Boston USA
    • Chen, Y.1    Hwang, K.2    Ku, W.3
  • 15
    • 77953753918 scopus 로고    scopus 로고
    • Ntp: the network time protocol, http://www.ntp.org
  • 16
    • 0002916530 scopus 로고
    • Continuous inspection schemes
    • Page, E.S.: Continuous inspection schemes. Biometrika, 100-115 (1954)
    • (1954) Biometrika , pp. 100-115
    • Page, E.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.