메뉴 건너뛰기




Volumn 24 LNICST, Issue , 2010, Pages 33-50

Weak process models for attack detection in a clustered sensor network using mobile agents

Author keywords

Alarm generation; Anomaly detection; Threat identification; Weak process models

Indexed keywords

AGENT BASED; ALARM GENERATION; ANOMALY DETECTION; ATTACK DETECTION; CLUSTERED SENSOR NETWORKS; DESIGN APPROACHES; DETECTION TECHNIQUE; FINAL STATE; HIGH POTENTIAL; INCOMING TRAFFIC; INTRUSION DETECTION SYSTEMS; NON-PARAMETRIC; PROCESS MODEL; REACHABILITY; STATE TRANSITION PROBABILITIES; THREAT IDENTIFICATION; WEAK PROCESS MODELS;

EID: 84885891780     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-11528-8_4     Document Type: Conference Paper
Times cited : (5)

References (35)
  • 3
    • 0015600423 scopus 로고
    • The viterbi algorithm
    • Forney, G.: The Viterbi Algorithm. Proc. IEEE 61(3), 268-278 (1973)
    • (1973) Proc. IEEE , vol.61 , Issue.3 , pp. 268-278
    • Forney, G.1
  • 7
    • 3142684688 scopus 로고    scopus 로고
    • Self organized critically and stochastic learning based intrusion detection system for wireless sensor networks
    • Doumit, S., Agrawal, D.: Self Organized Critically and Stochastic Learning Based Intrusion Detection System for Wireless Sensor Networks. In: Military Communications Conference, MILCOM (2003)
    • (2003) Military Communications Conference, MILCOM
    • Doumit, S.1    Agrawal, D.2
  • 15
    • 0022594196 scopus 로고
    • An introduction to hidden markov models
    • Rabiner, L., Juang, B.: An Introduction to Hidden Markov Models. IEEE ASSP Magazine, 4-16 (1986)
    • (1986) IEEE ASSP Magazine , pp. 4-16
    • Rabiner, L.1    Juang, B.2
  • 16
    • 84885892161 scopus 로고    scopus 로고
    • http://www.tinyos.net/tinyos2.x/doc
  • 22
    • 34247500449 scopus 로고    scopus 로고
    • Efficacy of Hidden Markov Models over neural networks in anomaly intrusion detection
    • DOI 10.1109/COMPSAC.2006.40, 4020093, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006
    • Al-Subaie, M., Zulkernine, M.: Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection. In: Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 325-332 (2006) (Pubitemid 46661664)
    • (2006) Proceedings - International Computer Software and Applications Conference , vol.1 , pp. 325-332
    • Al-Subaie, M.1    Zulkernine, M.2
  • 25
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In: Proceedings of the INFOCOM 2003 (2003)
    • (2003) Proceedings of the INFOCOM 2003
    • Hu, Y.1    Perrig, A.2    Johnson, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.