| dc.contributor.author | Adaobi, O. | en_US |
| dc.contributor.author | Ghassemian, M. | en_US |
| dc.date.accessioned | 1399-07-08T18:32:17Z | fa_IR |
| dc.date.accessioned | 2020-09-29T18:32:17Z | |
| dc.date.available | 1399-07-08T18:32:17Z | fa_IR |
| dc.date.available | 2020-09-29T18:32:17Z | |
| dc.date.issued | 2011-12-01 | en_US |
| dc.date.issued | 1390-09-10 | fa_IR |
| dc.date.submitted | 2011-02-01 | en_US |
| dc.date.submitted | 1389-11-12 | fa_IR |
| dc.identifier.citation | Adaobi, O., Ghassemian, M.. (2011). Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks. International Journal of Communications and Information Technology, 1(1), 16-20. doi: 10.22111/cit.2011.88 | en_US |
| dc.identifier.issn | 2322-4606 | |
| dc.identifier.uri | https://dx.doi.org/10.22111/cit.2011.88 | |
| dc.identifier.uri | https://cit.usb.ac.ir/article_88.html | |
| dc.identifier.uri | https://iranjournals.nlai.ir/handle/123456789/46335 | |
| dc.description.abstract | Wireless Sensor Networks (WSNs) are<br />becoming increasingly popular, and very useful in military<br />applications and environmental monitoring. However,<br />security is a major challenge for WSNs because they are<br />usually setup in unprotected environments. Our goal in this<br />study is to simulate an Intrusion Detection System (IDS)<br />that monitors the WSN and report intrusions accurately and<br />effectively. We have thus simulated an IDS that uses<br />anomaly-based technique to monitor traffic pattern on the<br />network following a fixed-width clustering algorithm. Our<br />simulation is based on the sensor network simulation<br />package by the Naval Research laboratory (NRL). To<br />evaluate the IDS, we simulated a sensor network,<br />investigated it with the presence of phenomenon, and<br />extended it to generate denial of service attacks. We have<br />used the phenomenon contribution to generate a realistic<br />traffic pattern for accurate evaluation of protocols, and<br />compared it to the traditional method of using only cbr<br />traffic, which is usually been employed by most<br />researchers. We further adapted the IDS into this simulated<br />network, and our results show that the selected IDS has<br />detection rate of over 90% with a very low false positive<br />rate of less than 1%. We obtained this by configuring every<br />node to independently monitor detect and report intrusions. | en_US |
| dc.format.extent | 720 | |
| dc.format.mimetype | application/pdf | |
| dc.language | English | |
| dc.language.iso | en_US | |
| dc.publisher | University of Sistan and Baluchestan | en_US |
| dc.relation.ispartof | International Journal of Communications and Information Technology | en_US |
| dc.relation.isversionof | https://dx.doi.org/10.22111/cit.2011.88 | |
| dc.subject | Intrusion detection | en_US |
| dc.subject | Anomaly-based detection | en_US |
| dc.subject | Routing attacks | en_US |
| dc.subject | Wireless Self-organised Networks | en_US |
| dc.title | Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks | en_US |
| dc.type | Text | en_US |
| dc.type | Research Paper | en_US |
| dc.contributor.department | School of Computing and Mathematical Sciences, University of Greenwich | en_US |
| dc.contributor.department | School of Computing and Mathematical Sciences, University of Greenwich | en_US |
| dc.citation.volume | 1 | |
| dc.citation.issue | 1 | |
| dc.citation.spage | 16 | |
| dc.citation.epage | 20 | |