An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs.
Fatma GaraLeila Ben SaadRahma Ben AyedPublished in: IWCMC (2017)
Keyphrases
- intrusion detection system
- network traffic
- attack detection
- intrusion detection
- attack scenarios
- network layer
- computer networks
- misuse detection
- alert correlation
- network intrusions
- wireless sensor networks
- network security
- denial of service attacks
- cyber attacks
- malicious activities
- routing algorithm
- normal traffic
- network attacks
- normal behavior
- anomaly detection
- routing protocol
- network intrusion
- network intrusion detection
- security measures
- ip address
- distributed intrusion detection
- computer systems
- traffic engineering
- energy consumption
- data mining
- cyber security
- ddos attacks
- mobile networks
- data mining techniques
- dos attacks
- multi hop
- machine learning
- network management
- countermeasures
- data processing
- multistage
- sensor nodes
- sensor networks
- information security
- mobile users
- base station
- knowledge discovery
- mobile nodes
- real world
- lightweight
- mobile ad hoc networks
- resource constrained