Downloads provided by UsageCounts
arXiv: 1108.2656
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.
14 pages
FOS: Computer and information sciences, Computer Science - Cryptography and Security, False alarm, Hybrid Intrusion Detection System, Support Vector Machine (SVM), Cryptography and Security (cs.CR), Wireless Sensor Network, Classification Accuracy
FOS: Computer and information sciences, Computer Science - Cryptography and Security, False alarm, Hybrid Intrusion Detection System, Support Vector Machine (SVM), Cryptography and Security (cs.CR), Wireless Sensor Network, Classification Accuracy
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 27 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
| views | 3 | |
| downloads | 5 |

Views provided by UsageCounts
Downloads provided by UsageCounts