메뉴 건너뛰기




Volumn 15, Issue 2, 2015, Pages 276-294

Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection

Author keywords

Collaborative intrusion detection; Cumulative sum algorithms; Dempster Shafer theory of evidence; Jamming; Performance evaluation; Signal to interference plus noise ratio; Simple threshold algorithms

Indexed keywords

ALARM SYSTEMS; IEEE STANDARDS; JAMMING; PROBABILISTIC LOGICS; SIGNAL DETECTION; SIGNAL INTERFERENCE; SIGNAL TO NOISE RATIO;

EID: 84921841977     PISSN: 15308669     EISSN: 15308677     Source Type: Journal    
DOI: 10.1002/wcm.2341     Document Type: Article
Times cited : (28)

References (38)
  • 2
    • 84921889780 scopus 로고    scopus 로고
    • Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
    • September
    • Bicacki K, Tavli B. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards and Interfaces (Elsevier) September 2008; 2009: 931-941.
    • (2008) Computer Standards and Interfaces (Elsevier) , vol.2009 , pp. 931-941
    • Bicacki, K.1    Tavli, B.2
  • 4
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • May
    • Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: attack and defense strategies. IEEE Network May 2006; 20: 41-47.
    • (2006) IEEE Network , vol.20 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 6
    • 67349201061 scopus 로고    scopus 로고
    • Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments
    • Cardenas A, Radosavac S, Baras J. Evaluation of detection algorithms for mac layer misbehavior: theory and experiments. IEEE/ACM Transactions on Networking 2009; 17: 605-617.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , pp. 605-617
    • Cardenas, A.1    Radosavac, S.2    Baras, J.3
  • 8
    • 0004209735 scopus 로고
    • Princeton University Press: Princeton, New Jersey, USA
    • Shafer G. A Mathematical Theory of Evidence. Princeton University Press: Princeton, New Jersey, USA, 1976.
    • (1976) A Mathematical Theory of Evidence
    • Shafer, G.1
  • 9
    • 33748965525 scopus 로고    scopus 로고
    • MOJO: A distributed physical layer anomaly detection system for 802.11 WLANs
    • Upsala, Sweden
    • Sheth A, Doerr C, Grunwald D, Han R, Sicker D. MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs. In ACM MobiSys, Upsala, Sweden, 2006; 191-204.
    • (2006) ACM MobiSys , pp. 191-204
    • Sheth, A.1    Doerr, C.2    Grunwald, D.3    Han, R.4    Sicker, D.5
  • 13
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting syn flooding attacks
    • Siris V, Papagalou F. Application of anomaly detection algorithms for detecting syn flooding attacks. Computer Communications 2006; 29(9): 1433-1442.
    • (2006) Computer Communications , vol.29 , Issue.9 , pp. 1433-1442
    • Siris, V.1    Papagalou, F.2
  • 14
    • 35348828484 scopus 로고    scopus 로고
    • Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks
    • Cabrera J, Gutierez C, Mehra R. Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks. Information Fusion (Elsevier) 2008; 9(1): 96-119.
    • (2008) Information Fusion (Elsevier) , vol.9 , Issue.1 , pp. 96-119
    • Cabrera, J.1    Gutierez, C.2    Mehra, R.3
  • 22
    • 67349127851 scopus 로고    scopus 로고
    • Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
    • ACM: New York, NY, USA
    • Yu D, Frincke D. Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory. In ACM-SE 43: Proceedings of the 43rd Annual Southeast Regional Conference. ACM: New York, NY, USA, 2005; 142-147.
    • (2005) ACM-SE 43: Proceedings of the 43rd Annual Southeast Regional Conference , pp. 142-147
    • Yu, D.1    Frincke, D.2
  • 24
    • 32344436245 scopus 로고    scopus 로고
    • Anomaly intrusion detection in wireless sensor networks
    • Bhuse V, Gupta A. Anomaly intrusion detection in wireless sensor networks. Journal of High Speed Networks 2006; 15: 33-51.
    • (2006) Journal of High Speed Networks , vol.15 , pp. 33-51
    • Bhuse, V.1    Gupta, A.2
  • 34
    • 42749085766 scopus 로고    scopus 로고
    • Adaptive threshold computation for cusum-type procedures in change detection and isolation problems. Elsevier
    • Verdier G, Hilgert N, Vila J. Adaptive threshold computation for cusum-type procedures in change detection and isolation problems. Elsevier, Computational Statistics and Data Analysis 2008; 52: 4161-4174.
    • (2008) Computational Statistics and Data Analysis , vol.52 , pp. 4161-4174
    • Verdier, G.1    Hilgert, N.2    Vila, J.3
  • 35
    • 35549011836 scopus 로고    scopus 로고
    • Robust and efficient detection of DDoS attacks for largescale internet
    • Lu K, Wu D, Fan J, Todorovic S, Nucci A. Robust and efficient detection of DDoS attacks for largescale internet. Computer Networks 2007; 51(18): 5036-5056.
    • (2007) Computer Networks , vol.51 , Issue.18 , pp. 5036-5056
    • Lu, K.1    Wu, D.2    Fan, J.3    Todorovic, S.4    Nucci, A.5
  • 36
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • Chen Y, Hwang K, Ku W-S. Collaborative detection of DDoS attacks over multiple network domains. IEEE Transactions Parallel Distributed Systems 2007; 18(12): 1649-1662.
    • (2007) IEEE Transactions Parallel Distributed Systems , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 37
    • 51349133236 scopus 로고    scopus 로고
    • Detecting 802.11 MAC layer spoofing using received signal strength
    • IEEE: Phoenix, USA
    • Sheng Y, Tan K, Chen G, Kotz D, Campbell A. Detecting 802.11 MAC layer spoofing using received signal strength. In Proceedings of INFOCOM'08. IEEE: Phoenix, USA, 2008; 1768-1776.
    • (2008) Proceedings of INFOCOM'08 , pp. 1768-1776
    • Sheng, Y.1    Tan, K.2    Chen, G.3    Kotz, D.4    Campbell, A.5
  • 38
    • 0023311178 scopus 로고
    • On the Dempster-Shafer framework and new combination rules
    • Yager R. On the Dempster-Shafer framework and new combination rules. Information Sciences 1987; 41: 93-137.
    • (1987) Information Sciences , vol.41 , pp. 93-137
    • Yager, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.