2012
DOI: 10.1016/j.eij.2012.10.003
|View full text |Cite
|
Sign up to set email alerts
|

A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Machine learning techniques are widely adopted in the existing reputation mechanism. Among them, the most popular intrusion detection schemes are based on Fuzzy -Means clustering, Backpropagation Neural Network, Self-Organizing Maps, Wavelets, Agglomerative Clustering, and Bayesian classifier [34]. In particular, Self-Organizing Maps (SOM) emerge as a technique suitable for constrained and unattended environments, like WSN, in which the node behavior may be not predictable a priori.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Machine learning techniques are widely adopted in the existing reputation mechanism. Among them, the most popular intrusion detection schemes are based on Fuzzy -Means clustering, Backpropagation Neural Network, Self-Organizing Maps, Wavelets, Agglomerative Clustering, and Bayesian classifier [34]. In particular, Self-Organizing Maps (SOM) emerge as a technique suitable for constrained and unattended environments, like WSN, in which the node behavior may be not predictable a priori.…”
Section: Discussionmentioning
confidence: 99%
“…The focus, with GoNe, is on the last approach, due to the potentialities of learning algorithms and neural networks in recognizing in an inexpensive and fast way the misbehavior happening within the WSN. Note that such a feature also concerns large-scale environments, as demonstrated in [34], which shows a performance comparison among different IDS techniques. It reveals that the approaches based on neural networks outperform the others.…”
Section: Malicious Node Detectionmentioning
confidence: 99%
“…When the ID system is switched either detection or prevention mode from learning mode, it begins to compare the usual traffic with the initially created profile, and any detected anomalous activity deviating from the base line profile will trigger an alarm cautioning the administrator to possible intrusion or otherwise prevent it if set to prevention mode. With specific traffic behaviors, user defined profiles can also be generated, for example the amount of e-mails published by a user and user access attempts [7] Examples are Snort, and BroIDS are detection system based on anomaly for ID systems [6].…”
Section: ) Based On Known or Unknown Attack Patterns I-anomaly Based Intrusion Detection Systemmentioning
confidence: 99%
“…Different types of attacks was examined for detecting and rectification of the outliers. Soliman et al [11] compare and asses the most commonly used outlier based intrusion detecting system in hierarchical WSNs and also determined some of the strengthens and weaknesses of each technique. Rassam et al [12] have presented data reduction by transforming the raw data to another space in WSNs using an adaptive and efficient Principle Component Analysis (PCA).…”
Section: Related Workmentioning
confidence: 99%