Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

Riaz Ahmed Shaikh, Hassan Jameel, Brian J. D'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at the modest communication cost.

Original languageEnglish
Title of host publicationProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
Pages2038-2043
Number of pages6
DOIs
Publication statusPublished - 2008 Dec 1
Event9th International Conference for Young Computer Scientists, ICYCS 2008 - Zhang Jia Jie, Hunan, China
Duration: 2008 Nov 182008 Nov 21

Other

Other9th International Conference for Young Computer Scientists, ICYCS 2008
CountryChina
CityZhang Jia Jie, Hunan
Period08/11/1808/11/21

Fingerprint

Intrusion detection
Wireless sensor networks
communication
Communication
costs
Costs

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Education

Cite this

Shaikh, R. A., Jameel, H., D'Auriol, B. J., Lee, S., Song, Y. J., & Lee, H. (2008). Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks. In Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008 (pp. 2038-2043). [4709287] https://doi.org/10.1109/ICYCS.2008.489

Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks. / Shaikh, Riaz Ahmed; Jameel, Hassan; D'Auriol, Brian J.; Lee, Sungyoung; Song, Young Jae; Lee, Heejo.

Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. 2008. p. 2038-2043 4709287.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shaikh, RA, Jameel, H, D'Auriol, BJ, Lee, S, Song, YJ & Lee, H 2008, Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks. in Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008., 4709287, pp. 2038-2043, 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, 08/11/18. https://doi.org/10.1109/ICYCS.2008.489
Shaikh RA, Jameel H, D'Auriol BJ, Lee S, Song YJ, Lee H. Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks. In Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. 2008. p. 2038-2043. 4709287 https://doi.org/10.1109/ICYCS.2008.489
Shaikh, Riaz Ahmed ; Jameel, Hassan ; D'Auriol, Brian J. ; Lee, Sungyoung ; Song, Young Jae ; Lee, Heejo. / Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks. Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. 2008. pp. 2038-2043
@inproceedings{8a3bc0df395e45449199137c33f1c327,
title = "Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks",
abstract = "Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at the modest communication cost.",
author = "Shaikh, {Riaz Ahmed} and Hassan Jameel and D'Auriol, {Brian J.} and Sungyoung Lee and Song, {Young Jae} and Heejo Lee",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/ICYCS.2008.489",
language = "English",
isbn = "9780769533988",
pages = "2038--2043",
booktitle = "Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008",

}

TY - GEN

T1 - Trusting anomaly and intrusion claims for cooperative distributed intrusion detection schemes of wireless sensor networks

AU - Shaikh, Riaz Ahmed

AU - Jameel, Hassan

AU - D'Auriol, Brian J.

AU - Lee, Sungyoung

AU - Song, Young Jae

AU - Lee, Heejo

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at the modest communication cost.

AB - Any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at the modest communication cost.

UR - http://www.scopus.com/inward/record.url?scp=58349114050&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=58349114050&partnerID=8YFLogxK

U2 - 10.1109/ICYCS.2008.489

DO - 10.1109/ICYCS.2008.489

M3 - Conference contribution

AN - SCOPUS:58349114050

SN - 9780769533988

SP - 2038

EP - 2043

BT - Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

ER -