Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices.
Daniel C. NashThomas L. MartinDong S. HaMichael S. HsiaoPublished in: PerCom Workshops (2005)
Keyphrases
- intrusion detection system
- mobile computing devices
- attack detection
- network intrusion detection systems
- intrusion detection
- network attacks
- network intrusions
- misuse detection
- denial of service attacks
- mobile devices
- attack scenarios
- network security
- intrusion prevention
- normal behavior
- malicious activities
- computer security
- cyber attacks
- network traffic data
- network intrusion detection
- anomaly detection
- unauthorized access
- network intrusion
- computer networks
- network traffic
- security measures
- mobile database
- normal traffic
- distributed intrusion detection
- alert correlation
- dos attacks
- computer systems
- databases
- cyber security
- data mining techniques
- data mining
- countermeasures
- multistage
- database
- maximum likelihood