Abstract | ||
---|---|---|
A considerable amount of research has been undertaken in the field of intrusion detection in wireless sensor networks. Researchers proposed a number of relevant mechanisms, and it is not an easy task to select the right ones for a given application scenario. Even when a network operator knows what mechanism to use, it remains an open issue how to configure this particular mechanism in such a way that it is efficient for the particular needs. We propose a framework that optimizes the configuration of an intrusion detection system in terms of detection accuracy and memory usage. There is a variety of scenarios, and a single set of configuration values is not optimal for all of them. Therefore, we believe, such a framework is of a great value for a network operator who needs to optimize an intrusion detection system for his particular needs, e.g., attacker model, environment, node parameters. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/978-3-319-07536-5_21 | Lecture Notes in Computer Science |
Keywords | Field | DocType |
Intrusion detection,optimization,wireless sensor networks | Key distribution in wireless sensor networks,Computer security,Computer science,Computer network,Real-time computing,Intrusion prevention system,Operator (computer programming),Attacker model,Intrusion detection system,Wireless sensor network | Conference |
Volume | ISSN | Citations |
8479 | 0302-9743 | 5 |
PageRank | References | Authors |
0.49 | 22 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Andriy Stetsko | 1 | 36 | 4.67 |
Tobiás Smolka | 2 | 5 | 0.49 |
Vashek Matyas | 3 | 165 | 29.25 |
Martin Stehlík | 4 | 8 | 0.90 |