Specification-based IDS for securing RPL from topology attacks.
Anhtuan LeJonathan LooYuan LuoAboubaker LasebaePublished in: Wireless Days (2011)
Keyphrases
- intrusion detection system
- network intrusion detection systems
- intrusion detection
- network intrusions
- misuse detection
- intrusion prevention
- attack detection
- attack scenarios
- countermeasures
- information security
- denial of service attacks
- anomaly detection
- computer security
- normal behavior
- malicious users
- network intrusion
- user defined
- network attacks
- cyber attacks
- malicious attacks
- cooperative
- data sets
- normal traffic
- watermarking scheme
- network security
- formal verification
- terrorist attacks
- security threats
- specification language
- formal methods
- watermarking algorithm
- web services
- data mining