Applying intrusion detection systems to wireless sensor networks.
Rodrigo RomanJianying ZhouJavier LópezPublished in: CCNC (2006)
Keyphrases
- intrusion detection system
- wireless sensor networks
- intrusion detection
- network security
- anomaly detection
- computer networks
- network traffic
- network intrusion detection
- computer security
- intrusion prevention
- distributed intrusion detection
- alert correlation
- sensor networks
- attack detection
- resource constrained
- computer systems
- denial of service attacks
- network intrusion detection systems
- routing protocol
- data mining techniques
- cyber security
- cyber attacks
- network attacks
- information security
- security policies
- feature selection
- learning algorithm