메뉴 건너뛰기




Volumn 16, Issue 4, 2017, Pages 401-416

TermID: a distributed swarm intelligence-based approach for wireless intrusion detection

Author keywords

Ant colony; Computer intrusion detection; Distributed computing; Machine learning; Swarm intelligence; Wireless networks

Indexed keywords

ANT COLONY OPTIMIZATION; ARTIFICIAL INTELLIGENCE; DISTRIBUTED COMPUTER SYSTEMS; LEARNING SYSTEMS; MERCURY (METAL); SENSOR NODES; WIRELESS NETWORKS;

EID: 84975125267     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-016-0335-z     Document Type: Article
Times cited : (43)

References (23)
  • 1
    • 84925368904 scopus 로고    scopus 로고
    • Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX security, pp. 15–28 (2003)
    • (2003) In USENIX security , pp. 15-28
    • Bellardo, J.1
  • 2
    • 70350650693 scopus 로고    scopus 로고
    • Signaling-oriented dos attacks in UMTS networks
    • Kambourakis, G., Kolias, C., Gritzalis, S., Hyuk-Park, J.: . In: Park, J.H., Chen, H.H., Atiquzzaman, M., Kim, T.H., Yeo, S.S. (eds.) , Seoul, Korea, June 25–27, 2009. Proceedings, pp. 280–289. Springer, Berlin Heidelberg
    • Kambourakis, G., Kolias, C., Gritzalis, S., Hyuk-Park, J.: Signaling-oriented dos attacks in UMTS networks. In: Park, J.H., Chen, H.H., Atiquzzaman, M., Kim, T.H., Yeo, S.S. (eds.) Advances in information security and assurance: third international conference and workshops, Workshops, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings, pp. 280–289. Springer, Berlin Heidelberg (2009). doi:10.1007/978-3-642-02617-1_29
    • (2009) Advances in information security and assurance: third international conference and workshops, Workshops, ISA 2009
  • 3
    • 84873738656 scopus 로고    scopus 로고
    • Attacks and countermeasures on 802.16: analysis and assessment
    • Kolias, C., Kambourakis, G., Gritzalis, S.: Attacks and countermeasures on 802.16: analysis and assessment. Commun. Surv. Tutor. IEEE 15(1), 487–514 (2013)
    • (2013) Commun. Surv. Tutor. IEEE , vol.15 , Issue.1 , pp. 487-514
    • Kolias, C.1    Kambourakis, G.2    Gritzalis, S.3
  • 4
    • 84876037049 scopus 로고    scopus 로고
    • Lte/sae security issues on 4g wireless networks
    • Bikos, A.N., Sklavos, N.: Lte/sae security issues on 4g wireless networks. Secur. Priv. IEEE 11(2), 55–62 (2013)
    • (2013) Secur. Priv. IEEE , vol.11 , Issue.2 , pp. 55-62
    • Bikos, A.N.1    Sklavos, N.2
  • 5
    • 84887875430 scopus 로고    scopus 로고
    • Scaling up classification rule induction through parallel processing
    • Stahl, F., Bramer, M.: Scaling up classification rule induction through parallel processing. Knowl. Eng. Rev. 28(04), 451–478 (2013)
    • (2013) Knowl. Eng. Rev. , vol.28 , Issue.4 , pp. 451-478
    • Stahl, F.1    Bramer, M.2
  • 9
    • 85022147968 scopus 로고    scopus 로고
    • Online.: Widz. http://www.securiteam.com/tools/5WP001F8VO.html (2016)
    • (2016) Widz.
  • 11
    • 85022126612 scopus 로고    scopus 로고
    • Online: Snort wireless. http://lpc1.clpccd.cc.ca.us/lpc/jgonder/studentresources/TNT%20v.%202.6/docs/ids/airsnare/guide.htmlg (2016)
    • (2016) Online: Snort wireless.
  • 12
    • 85022157852 scopus 로고    scopus 로고
    • Dragorn: Kismet. https://www.kismetwireless.net (2016)
    • (2016) Dragorn: Kismet.
  • 14
    • 85022172349 scopus 로고    scopus 로고
    • Zebra: airdefense. https://www.zebra.com/us/en/products/networks/wireless-lan/wlan-products/wlan-management-security/wids-wips.html (2016)
    • (2016) Zebra: airdefense.
  • 16
    • 84873338686 scopus 로고    scopus 로고
    • Intrusion detection systems in wireless sensor networks: a review
    • Alrajeh, N.A., Khan, S., Shams, B.: Intrusion detection systems in wireless sensor networks: a review. Int. J. Distrib. Sens. Netw. 2013, 1–7 (2013). doi:10.1155/2013/167575
    • (2013) Int. J. Distrib. Sens. Netw , vol.2013 , pp. 1-7
    • Alrajeh, N.A.1    Khan, S.2    Shams, B.3
  • 20
    • 84962359508 scopus 로고    scopus 로고
    • Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset
    • Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18, 185–208 (2015). doi:10.1109/COMST.2015.2402161
    • (2015) IEEE Commun. Surv. Tutor , vol.18 , pp. 185-208
    • Kolias, C.1    Kambourakis, G.2    Stavrou, A.3    Gritzalis, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.