Using network traffic to infer compromised neighbors in wireless sensor nodes.
J. M. ChandramouliJuan RamosLakshmi SrinivasanPrahlad SureshPrashanth KannanGarth V. CrosbyLanier A. WatkinsPublished in: CCNC (2017)
Keyphrases
- network traffic
- wireless sensor nodes
- wireless sensor networks
- sensor networks
- wireless communication
- intrusion detection
- anomaly detection
- computer networks
- resource constrained
- network security
- intrusion detection system
- sensor nodes
- traffic analysis
- network monitoring
- internet traffic
- network bandwidth
- traffic patterns
- network resources
- network intrusion detection
- traffic data
- detecting anomalous
- base station
- network traffic data
- routing algorithm
- sensor data
- data points
- long range dependence
- normal traffic
- real world
- high dimensional
- training set