Skip to main content

Distributed Intrusion Detection System for Sensor Networks

  • Conference paper
  • 1421 Accesses

Abstract

An intruder tries to disable the single point in a network, i.e. the central analyzer. If this is disabled, the entire network is without protection. Since the sensor nodes fail often, the use of a centralized analyzer is highly limited. Processing all the information at a single host implies a limit on the size of the network that can be monitored. Because of the limit of the central analyzer, it is difficult to keep up with the flow of information in large network like sensor. We have proposed distributed intrusion detection system for distribute sensor networks.

Keywords

  • Sensor Network
  • Sensor Node
  • Cluster Head
  • Relay Node
  • Intrusion Detection

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Designing a Web of Highly-Configurable Intrusion Detection Sensors, Giovanni Vigna, Richard A. Kemmerer and Per Blix Reliable Software Group Department of Computer Science University of California, Santa Barbara, Lecture Notes of Computer Science, Springer 2001.

    Google Scholar 

  2. Computer System Intrusion Detection: A Survey, Anita K. Jones and Robert S. Sielken Department of Computer Science University of Virginia Thornton Hall Charlottesville, VA 2003.

    Google Scholar 

  3. An Architecture for Intrusion Detection using Autonomous Agents, Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford, Diego Zamboni, COAST Laboratory Purdue University West Lafayette, IN 47907-1398, 2003.

    Google Scholar 

  4. Intrusion Detection Techniques for Mobile Wireless Networks, Yongguang Zhang, Wenke Lee, and Yi-An Huang ACM Mobile Networks and Applications (MONET) Journal 2003

    Google Scholar 

  5. Network Security Essentials: Applications and Standards, William Stallings. Page 292-303

    Google Scholar 

  6. NETSTAT: A Network Based Intrusion Detection System, Vigna, Giovanni. Kemmerer, Richard A. Journal of Computer Security. v 7 n 1 1999. p 37-71.

    Google Scholar 

  7. Identification of Host Audit data to Detect Attacks on Low Level IP Vulnerabilities, Daniels, Thomas E. Spafford, Eugene H. Journal of Computer Security. v 7 n 1 1999. p 3-35.

    Google Scholar 

  8. Intrusion Detection Systems: Expectations, Ideals and Realities, Ranum, Marcus. Computer Security Journal. v 15 n 4 1999. p 25-45.

    Google Scholar 

  9. Securing ad hoc networks, Lidong Z., Zygmunt J. H., IEEE Network, Vol. 13, No. 6, 1999, pp. 24-30.

    Google Scholar 

  10. Mitigating Routing Misbehavior in Mobile, Marti S., Giuli T.J., Lai K. Baker M. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM 2000, pp 255-265.

    Google Scholar 

  11. Information Theoretic Measures for Anomaly Detection, Wenke Lee, Dong Xiang par Proc. of the 2001 IEEE Symposium on Security and Privacy

    Google Scholar 

  12. Detecting Intrusions Using System Calls: Alternative Data Models, Christina Warrender Stephanie Forrest Barak Pearlmutter Dept. of Computer.IEEE Symposium on Security and Privacy

    Google Scholar 

  13. Learning Patterns from Unix Process, Wenke Lee and Salvatore J. Stolfo Computer Science Department Columbia.Proceedings of the AAAI97 workshop on AI methods in Fraud and risk management, 1997.

    Google Scholar 

  14. Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods, Daniel J. Burroughs, Linda F. Wilson and George V. Cybenko Thayer School of Engineering Dartmouth College Hanover, NH 03755, 2002.

    Google Scholar 

  15. Modeling System Calls for Intrusion Detection with Dynamic Window Sizes, Eleazar Eskin, Wenke Lee, Salvatore J. Stolfo, DISCEX 2001.

    Google Scholar 

  16. Anomaly Detection over Noisy Data using Learned Probability Distributions, Eleazar Eskin Proc. 17th International Conf. on Machine Learning, 2001.

    Google Scholar 

  17. A Markov Chain Model of Temporal Behavior for Anomaly Detection, Nong Ye Arizona State University, 2000

    Google Scholar 

  18. Adaptive Model Generation for Intrusion Detection Systems, Eleazar Eskin, Matthew Miller, Zhi-Da Zhong, George Yi, Wei-Ang Lee, Salvatore Stolfo., 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer

About this paper

Cite this paper

Panja, B., Rashad, S. (2007). Distributed Intrusion Detection System for Sensor Networks. In: Sobh, T. (eds) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6268-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6268-1_22

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6267-4

  • Online ISBN: 978-1-4020-6268-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics