2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (Sutc 2008) 2008
DOI: 10.1109/sutc.2008.39
|View full text |Cite
|
Sign up to set email alerts
|

A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 70 publications
(37 citation statements)
references
References 17 publications
0
37
0
Order By: Relevance
“…In [18] a trust management system is proposed to defend against attacks inside the WSN which uses beta distribution to evaluate the different nodes' credibility. Finally, many works are based on computational intelligence techniques [25] or propose Fuzzy logic approaches for detecting intrusion in WSN [26][27][28][29][30] or learning algorithms and neural networks (i.e., clustering, SOM, and learning automata) [5,7,[31][32][33]. The focus, with GoNe, is on the last approach, due to the potentialities of learning algorithms and neural networks in recognizing in an inexpensive and fast way the misbehavior happening within the WSN.…”
Section: Malicious Node Detectionmentioning
confidence: 99%
“…In [18] a trust management system is proposed to defend against attacks inside the WSN which uses beta distribution to evaluate the different nodes' credibility. Finally, many works are based on computational intelligence techniques [25] or propose Fuzzy logic approaches for detecting intrusion in WSN [26][27][28][29][30] or learning algorithms and neural networks (i.e., clustering, SOM, and learning automata) [5,7,[31][32][33]. The focus, with GoNe, is on the last approach, due to the potentialities of learning algorithms and neural networks in recognizing in an inexpensive and fast way the misbehavior happening within the WSN.…”
Section: Malicious Node Detectionmentioning
confidence: 99%
“…However, similar to [12] the focus is on the performance (i.e., the accuracy of detection) of the IDS rather than a generic security framework. In [14] a framework of a machine learning based IDS for WSNs was presented without any evaluation of the scheme; only the rules for the proposed IDS was listed without any results and real experiment on sensors. In [15], embedded sensor networks were utilized to supplement wireless intrusion detection systems (WIDSs) on physical site surveillance and security tasks.…”
Section: Related Workmentioning
confidence: 99%
“…In [21] the authors propose a framework of a machine learning based intrusion detection system. An intrusion detection agent is implemented by each node to overhear the traffic of its neighbors, but there is no cooperation among nodes to detect attackers.…”
Section: Related Workmentioning
confidence: 99%