Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata.
Mir Ali Rezazadeh BaeeLeonie SimpsonWarren ArmstrongPublished in: IEEE Open J. Comput. Soc. (2024)
Keyphrases
- anomaly detection
- key management
- metadata
- key distribution
- provably secure
- security protocols
- group communication
- key establishment
- key management scheme
- resource constrained
- elliptic curve
- intrusion detection
- ad hoc networks
- wireless sensor networks
- secure communication
- digital libraries
- network traffic
- databases
- diffie hellman
- anomalous behavior
- network intrusion detection
- detecting anomalies
- network anomaly detection
- secret key
- intrusion detection system
- digital signature
- authentication protocol
- network security
- detect anomalies
- lightweight
- unsupervised learning
- normal behavior
- low cost
- computer systems
- negative selection algorithm