2015 International Conference on Green Computing and Internet of Things (ICGCIoT) 2015
DOI: 10.1109/icgciot.2015.7380455
|View full text |Cite
|
Sign up to set email alerts
|

An effective model for anomaly IDS to improve the efficiency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Figure 8 below illustrates the network's power usage following the implementation of the suggested IDS and says that power consumption is very low even when the network is attacked by 30% of attacker nodes. When comparing the power consumption of the proposed system to [14], [20], and [21], it is found that the proposed IDS's power consumption is extremely low, maintaining the network lifetime constant, making the suggested system more effective than existing IDS systems. The malicious node is also located and eliminated from the network.…”
Section: Results Analysismentioning
confidence: 99%
“…Figure 8 below illustrates the network's power usage following the implementation of the suggested IDS and says that power consumption is very low even when the network is attacked by 30% of attacker nodes. When comparing the power consumption of the proposed system to [14], [20], and [21], it is found that the proposed IDS's power consumption is extremely low, maintaining the network lifetime constant, making the suggested system more effective than existing IDS systems. The malicious node is also located and eliminated from the network.…”
Section: Results Analysismentioning
confidence: 99%