Attack Detection vs Privacy – How to Find the Link or How to Hide It (Transcript of Discussion)

  • Jiří Kůr
  • Andriy Stetsko
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7114)


Alf Zugenmaier: What exactly does the IDS try to detect, what kind of intrusions?

Jiří Kůr: The IDS tries to detect the malicious nodes and the malicious activity of these nodes.

Mike Burmester: So anomalous behaviour?

Jiří Kůr: Yes, in principle. The particular examples may be packet dropping, packet injection, packet modification, jamming, and so on.

Alf Zugenmaier: Do you have a list of that coming up, because these are so various examples. How far do you want to push the IDS, what it is supposed to detect and what it is not supposed to detect?


Wireless Sensor Network Malicious Node Attack Detection Multiple Identity Malicious Activity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jiří Kůr
    • 1
  • Andriy Stetsko
    • 1
  1. 1.Masaryk UniversityBrnoCzech Republic

Personalised recommendations