نمایش مختصر رکورد

dc.contributor.authorAdaobi, O.en_US
dc.contributor.authorGhassemian, M.en_US
dc.date.accessioned1399-07-08T18:32:17Zfa_IR
dc.date.accessioned2020-09-29T18:32:17Z
dc.date.available1399-07-08T18:32:17Zfa_IR
dc.date.available2020-09-29T18:32:17Z
dc.date.issued2011-12-01en_US
dc.date.issued1390-09-10fa_IR
dc.date.submitted2011-02-01en_US
dc.date.submitted1389-11-12fa_IR
dc.identifier.citationAdaobi, O., Ghassemian, M.. (2011). Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks. International Journal of Communications and Information Technology, 1(1), 16-20. doi: 10.22111/cit.2011.88en_US
dc.identifier.issn2322-4606
dc.identifier.urihttps://dx.doi.org/10.22111/cit.2011.88
dc.identifier.urihttps://cit.usb.ac.ir/article_88.html
dc.identifier.urihttps://iranjournals.nlai.ir/handle/123456789/46335
dc.description.abstractWireless Sensor Networks (WSNs) are<br />becoming increasingly popular, and very useful in military<br />applications and environmental monitoring. However,<br />security is a major challenge for WSNs because they are<br />usually setup in unprotected environments. Our goal in this<br />study is to simulate an Intrusion Detection System (IDS)<br />that monitors the WSN and report intrusions accurately and<br />effectively. We have thus simulated an IDS that uses<br />anomaly-based technique to monitor traffic pattern on the<br />network following a fixed-width clustering algorithm. Our<br />simulation is based on the sensor network simulation<br />package by the Naval Research laboratory (NRL). To<br />evaluate the IDS, we simulated a sensor network,<br />investigated it with the presence of phenomenon, and<br />extended it to generate denial of service attacks. We have<br />used the phenomenon contribution to generate a realistic<br />traffic pattern for accurate evaluation of protocols, and<br />compared it to the traditional method of using only cbr<br />traffic, which is usually been employed by most<br />researchers. We further adapted the IDS into this simulated<br />network, and our results show that the selected IDS has<br />detection rate of over 90% with a very low false positive<br />rate of less than 1%. We obtained this by configuring every<br />node to independently monitor detect and report intrusions.en_US
dc.format.extent720
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoen_US
dc.publisherUniversity of Sistan and Baluchestanen_US
dc.relation.ispartofInternational Journal of Communications and Information Technologyen_US
dc.relation.isversionofhttps://dx.doi.org/10.22111/cit.2011.88
dc.subjectIntrusion detectionen_US
dc.subjectAnomaly-based detectionen_US
dc.subjectRouting attacksen_US
dc.subjectWireless Self-organised Networksen_US
dc.titleEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networksen_US
dc.typeTexten_US
dc.typeResearch Paperen_US
dc.contributor.departmentSchool of Computing and Mathematical Sciences, University of Greenwichen_US
dc.contributor.departmentSchool of Computing and Mathematical Sciences, University of Greenwichen_US
dc.citation.volume1
dc.citation.issue1
dc.citation.spage16
dc.citation.epage20


فایل‌های این مورد

Thumbnail

این مورد در مجموعه‌های زیر وجود دارد:

نمایش مختصر رکورد