Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks

Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song

Research output: Contribution to journalArticle

7 Citations (Scopus)

Abstract

Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

Original languageEnglish
Pages (from-to)5989-6007
Number of pages19
JournalSensors
Volume9
Issue number8
DOIs
Publication statusPublished - 2009 Jun 1

Fingerprint

Intrusion detection
intrusion
Wireless sensor networks
sensors
anomalies
Costs and Cost Analysis
Communication
communication
Costs
costs

Keywords

  • Alerts
  • Anomalies
  • Intrusions
  • Trust management
  • Wireless sensor networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Atomic and Molecular Physics, and Optics
  • Analytical Chemistry
  • Biochemistry

Cite this

Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks. / Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young Jae.

In: Sensors, Vol. 9, No. 8, 01.06.2009, p. 5989-6007.

Research output: Contribution to journalArticle

Shaikh, Riaz Ahmed ; Jameel, Hassan ; d'Auriol, Brian J. ; Lee, Heejo ; Lee, Sungyoung ; Song, Young Jae. / Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks. In: Sensors. 2009 ; Vol. 9, No. 8. pp. 5989-6007.
@article{4e7434efa23d4d5abb446b222db09eb4,
title = "Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks",
abstract = "Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.",
keywords = "Alerts, Anomalies, Intrusions, Trust management, Wireless sensor networks",
author = "Shaikh, {Riaz Ahmed} and Hassan Jameel and d'Auriol, {Brian J.} and Heejo Lee and Sungyoung Lee and Song, {Young Jae}",
year = "2009",
month = "6",
day = "1",
doi = "10.3390/s90805989",
language = "English",
volume = "9",
pages = "5989--6007",
journal = "Sensors (Switzerland)",
issn = "1424-8220",
publisher = "Multidisciplinary Digital Publishing Institute (MDPI)",
number = "8",

}

TY - JOUR

T1 - Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks

AU - Shaikh, Riaz Ahmed

AU - Jameel, Hassan

AU - d'Auriol, Brian J.

AU - Lee, Heejo

AU - Lee, Sungyoung

AU - Song, Young Jae

PY - 2009/6/1

Y1 - 2009/6/1

N2 - Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

AB - Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

KW - Alerts

KW - Anomalies

KW - Intrusions

KW - Trust management

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=70349647891&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70349647891&partnerID=8YFLogxK

U2 - 10.3390/s90805989

DO - 10.3390/s90805989

M3 - Article

C2 - 22454568

AN - SCOPUS:70349647891

VL - 9

SP - 5989

EP - 6007

JO - Sensors (Switzerland)

JF - Sensors (Switzerland)

SN - 1424-8220

IS - 8

ER -