Attack Detection vs Privacy – How to Find the Link or How to Hide It (Transcript of Discussion)
Alf Zugenmaier: What exactly does the IDS try to detect, what kind of intrusions?
Jiří Kůr: The IDS tries to detect the malicious nodes and the malicious activity of these nodes.
Mike Burmester: So anomalous behaviour?
Jiří Kůr: Yes, in principle. The particular examples may be packet dropping, packet injection, packet modification, jamming, and so on.
Alf Zugenmaier: Do you have a list of that coming up, because these are so various examples. How far do you want to push the IDS, what it is supposed to detect and what it is not supposed to detect?
KeywordsWireless Sensor Network Malicious Node Attack Detection Multiple Identity Malicious Activity
Unable to display preview. Download preview PDF.