메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

A new intrusion detection system based on KNN classification algorithm in wireless sensor network

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL-OF-SERVICE ATTACK; INTERNET OF THINGS; INTRUSION DETECTION; LEARNING ALGORITHMS; ROUTING PROTOCOLS;

EID: 84904678436     PISSN: 20900147     EISSN: 20900155     Source Type: Journal    
DOI: 10.1155/2014/240217     Document Type: Article
Times cited : (258)

References (40)
  • 1
    • 77249166094 scopus 로고    scopus 로고
    • A survey on security in wireless mesh networks
    • 10.4103/0256-4602.58969 2-s2.0-77249166094
    • Yi P., Wu Y., Zou F., Liu N., A survey on security in wireless mesh networks. IETE Technical Review 2010 27 1 6 14 10.4103/0256-4602.58969 2-s2.0-77249166094
    • (2010) IETE Technical Review , vol.27 , Issue.1 , pp. 6-14
    • Yi, P.1    Wu, Y.2    Zou, F.3    Liu, N.4
  • 2
    • 33747437914 scopus 로고    scopus 로고
    • Flooding attack and defence in Ad hoc networks
    • DOI 10.1016/S1004-4132(06)60070-4
    • Yi P., Hou Y., Zhong Y. P., Dai Z. L., Flooding attack and defence in ad hoc networks. Journal of Systems Engineering and Electronics 2006 17 2 410 416 10.1016/S1004-4132(06)60070-4 (Pubitemid 44249053)
    • (2006) Journal of Systems Engineering and Electronics , vol.17 , Issue.2 , pp. 410-416
    • Yi, P.1    Hou, Y.2    Zhong, Y.3    Zhang, S.4    Dai, Z.5
  • 3
    • 0036321445 scopus 로고    scopus 로고
    • Use of k-nearest neighbor classifier for intrusion detection
    • DOI 10.1016/S0167-4048(02)00514-X
    • Liao Y., Vemuri V. R., Use of k-nearest neighbor classifier for intrusion detection. Computers & Security 2002 21 5 439 448 10.1016/S0167-4048(02) 00514-X 2-s2.0-0036321445 (Pubitemid 34835644)
    • (2002) Computers and Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 12
    • 51649105341 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach
    • 10.1016/j.pmcj.2008.05.005 2-s2.0-51649105341
    • Zhang W., Liu Y., Das S. K., De P., Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach. Pervasive and Mobile Computing 2008 4 5 658 680 10.1016/j.pmcj.2008.05.005 2-s2.0-51649105341
    • (2008) Pervasive and Mobile Computing , vol.4 , Issue.5 , pp. 658-680
    • Zhang, W.1    Liu, Y.2    Das, S.K.3    De, P.4
  • 19
    • 0035338003 scopus 로고    scopus 로고
    • A new intrusion detection method based on discriminant analysis
    • High-Speed Internet Technology and its Applications
    • Asaka M., Onabuta T., Inoue T., Okazawa S., Goto S., A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems 2001 5 570 577 2-s2.0-0035338003 (Pubitemid 32486789)
    • (2001) IEICE Transactions on Information and Systems , vol.E84-D , Issue.5 , pp. 570-577
    • Asaka, M.1    Onabuta, T.2    Inoue, T.3    Okazawa, S.4    Goto, S.5
  • 20
  • 23
    • 79954503285 scopus 로고    scopus 로고
    • Performance analysis of mobile ad hoc networks under flooding attacks
    • 10.3969/j.issn.1004-4132.2011.02.022 2-s2.0-79954503285
    • Yi P., Zou F., Zou Y., Wang Z., Performance analysis of mobile ad hoc networks under flooding attacks. Journal of Systems Engineering and Electronics 2011 22 2 334 339 10.3969/j.issn.1004-4132.2011.02.022 2-s2.0-79954503285
    • (2011) Journal of Systems Engineering and Electronics , vol.22 , Issue.2 , pp. 334-339
    • Yi, P.1    Zou, F.2    Zou, Y.3    Wang, Z.4
  • 24
    • 70350586784 scopus 로고    scopus 로고
    • Effects of denial of service attack in mobile ad hoc networks
    • 10.1007/s12204-009-0580-7 2-s2.0-70350586784
    • Yi P., Zhou Y., Wu Y., Liu N., Effects of denial of service attack in mobile ad hoc networks. Journal of Shanghai Jiaotong University (Science) 2009 14 5 580 583 10.1007/s12204-009-0580-7 2-s2.0-70350586784
    • (2009) Journal of Shanghai Jiaotong University (Science) , vol.14 , Issue.5 , pp. 580-583
    • Yi, P.1    Zhou, Y.2    Wu, Y.3    Liu, N.4
  • 25
    • 77952533096 scopus 로고    scopus 로고
    • Impact of two kinds of DoS attacks on mobile ad hoc networks
    • 2-s2.0-77952533096
    • Yi P., Cai J., Wu Y., Li Y., Impact of two kinds of DoS attacks on mobile ad hoc networks. Journal of Computational Information Systems 2009 5 5 1433 1443 2-s2.0-77952533096
    • (2009) Journal of Computational Information Systems , vol.5 , Issue.5 , pp. 1433-1443
    • Yi, P.1    Cai, J.2    Wu, Y.3    Li, Y.4
  • 26
    • 84862652347 scopus 로고    scopus 로고
    • Cross-layer detection for black hole attack in wireless network
    • 2-s2.0-84862652347
    • Yi P., Zhu T., Liu N., Wu Y., Li J., Cross-layer detection for black hole attack in wireless network. Journal of Computational Information Systems 2012 8 10 4101 4109 2-s2.0-84862652347
    • (2012) Journal of Computational Information Systems , vol.8 , Issue.10 , pp. 4101-4109
    • Yi, P.1    Zhu, T.2    Liu, N.3    Wu, Y.4    Li, J.5
  • 27
    • 80051939469 scopus 로고    scopus 로고
    • Intrusion detection for wireless mesh networks using finite state Machine
    • 2-s2.0-80051939469
    • Yi P., Wu Y., Liu N., Wang Z., Intrusion detection for wireless mesh networks using finite state Machine. China Communications 2010 7 5 40 48 2-s2.0-80051939469
    • (2010) China Communications , vol.7 , Issue.5 , pp. 40-48
    • Yi, P.1    Wu, Y.2    Liu, N.3    Wang, Z.4
  • 28
    • 80051974812 scopus 로고    scopus 로고
    • Towards an artificial immune system for detecting anomalies in wireless mesh networks
    • 2-s2.0-80051974812
    • Yi P., Wu Y., Chen J., Towards an artificial immune system for detecting anomalies in wireless mesh networks. China Communications 2011 8 3 107 117 2-s2.0-80051974812
    • (2011) China Communications , vol.8 , Issue.3 , pp. 107-117
    • Yi, P.1    Wu, Y.2    Chen, J.3
  • 29
    • 58649103569 scopus 로고    scopus 로고
    • Distributed intrusion detection for mobile ad hoc networks
    • 10.1016/S1004-4132(08)60163-2
    • Yi P., Jiang X., Wu Y., Distributed intrusion detection for mobile ad hoc networks. Journal of Systems Engineering and Electronics 2008 19 3 851 859 10.1016/S1004-4132(08)60163-2
    • (2008) Journal of Systems Engineering and Electronics , vol.19 , Issue.3 , pp. 851-859
    • Yi, P.1    Jiang, X.2    Wu, Y.3
  • 30
    • 84875048550 scopus 로고    scopus 로고
    • An intrusion prevention mechanism in mobile ad hoc networks
    • 2-s2.0-84875048550
    • Yi P., Zhu T., Ma J., Wu Y., An intrusion prevention mechanism in mobile ad hoc networks. Ad-Hoc & Sensor Wireless Networks 2013 17 3-4 269 292 2-s2.0-84875048550
    • (2013) Ad-Hoc & Sensor Wireless Networks , vol.17 , Issue.3-4 , pp. 269-292
    • Yi, P.1    Zhu, T.2    Ma, J.3    Wu, Y.4
  • 31
    • 40749116519 scopus 로고    scopus 로고
    • Mobile firewall: A framework to isolate intruders in wireless mesh networks
    • Yi P., Jiang X., Li J., Mobile firewall: a framework to isolate intruders in wireless mesh networks. Journal of Computational Information Systems 2007 3 6 2207 2218 2-s2.0-40749116519 (Pubitemid 351383174)
    • (2007) Journal of Computational Information Systems , vol.3 , Issue.6 , pp. 2207-2218
    • Yi, P.1    Jiang, X.2    Li, J.3
  • 32
    • 37549019694 scopus 로고    scopus 로고
    • Multi-agent cooperative intrusion response in mobile adhoc networks
    • 10.1016/S1004-4132(08)60021-3 2-s2.0-37549019694
    • Yi P., Zou F., Jiang X., Li J., Multi-agent cooperative intrusion response in mobile adhoc networks. Journal of Systems Engineering and Electronics 2007 18 4 785 794 10.1016/S1004-4132(08)60021-3 2-s2.0-37549019694
    • (2007) Journal of Systems Engineering and Electronics , vol.18 , Issue.4 , pp. 785-794
    • Yi, P.1    Zou, F.2    Jiang, X.3    Li, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.