Abstract
An intruder tries to disable the single point in a network, i.e. the central analyzer. If this is disabled, the entire network is without protection. Since the sensor nodes fail often, the use of a centralized analyzer is highly limited. Processing all the information at a single host implies a limit on the size of the network that can be monitored. Because of the limit of the central analyzer, it is difficult to keep up with the flow of information in large network like sensor. We have proposed distributed intrusion detection system for distribute sensor networks.
Keywords
- Sensor Network
- Sensor Node
- Cluster Head
- Relay Node
- Intrusion Detection
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Designing a Web of Highly-Configurable Intrusion Detection Sensors, Giovanni Vigna, Richard A. Kemmerer and Per Blix Reliable Software Group Department of Computer Science University of California, Santa Barbara, Lecture Notes of Computer Science, Springer 2001.
Computer System Intrusion Detection: A Survey, Anita K. Jones and Robert S. Sielken Department of Computer Science University of Virginia Thornton Hall Charlottesville, VA 2003.
An Architecture for Intrusion Detection using Autonomous Agents, Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, Eugene Spafford, Diego Zamboni, COAST Laboratory Purdue University West Lafayette, IN 47907-1398, 2003.
Intrusion Detection Techniques for Mobile Wireless Networks, Yongguang Zhang, Wenke Lee, and Yi-An Huang ACM Mobile Networks and Applications (MONET) Journal 2003
Network Security Essentials: Applications and Standards, William Stallings. Page 292-303
NETSTAT: A Network Based Intrusion Detection System, Vigna, Giovanni. Kemmerer, Richard A. Journal of Computer Security. v 7 n 1 1999. p 37-71.
Identification of Host Audit data to Detect Attacks on Low Level IP Vulnerabilities, Daniels, Thomas E. Spafford, Eugene H. Journal of Computer Security. v 7 n 1 1999. p 3-35.
Intrusion Detection Systems: Expectations, Ideals and Realities, Ranum, Marcus. Computer Security Journal. v 15 n 4 1999. p 25-45.
Securing ad hoc networks, Lidong Z., Zygmunt J. H., IEEE Network, Vol. 13, No. 6, 1999, pp. 24-30.
Mitigating Routing Misbehavior in Mobile, Marti S., Giuli T.J., Lai K. Baker M. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM 2000, pp 255-265.
Information Theoretic Measures for Anomaly Detection, Wenke Lee, Dong Xiang par Proc. of the 2001 IEEE Symposium on Security and Privacy
Detecting Intrusions Using System Calls: Alternative Data Models, Christina Warrender Stephanie Forrest Barak Pearlmutter Dept. of Computer.IEEE Symposium on Security and Privacy
Learning Patterns from Unix Process, Wenke Lee and Salvatore J. Stolfo Computer Science Department Columbia.Proceedings of the AAAI97 workshop on AI methods in Fraud and risk management, 1997.
Analysis of Distributed Intrusion Detection Systems Using Bayesian Methods, Daniel J. Burroughs, Linda F. Wilson and George V. Cybenko Thayer School of Engineering Dartmouth College Hanover, NH 03755, 2002.
Modeling System Calls for Intrusion Detection with Dynamic Window Sizes, Eleazar Eskin, Wenke Lee, Salvatore J. Stolfo, DISCEX 2001.
Anomaly Detection over Noisy Data using Learned Probability Distributions, Eleazar Eskin Proc. 17th International Conf. on Machine Learning, 2001.
A Markov Chain Model of Temporal Behavior for Anomaly Detection, Nong Ye Arizona State University, 2000
Adaptive Model Generation for Intrusion Detection Systems, Eleazar Eskin, Matthew Miller, Zhi-Da Zhong, George Yi, Wei-Ang Lee, Salvatore Stolfo., 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this paper
Cite this paper
Panja, B., Rashad, S. (2007). Distributed Intrusion Detection System for Sensor Networks. In: Sobh, T. (eds) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6268-1_22
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6268-1_22
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6267-4
Online ISBN: 978-1-4020-6268-1
eBook Packages: EngineeringEngineering (R0)
