Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining.
Jen-Yan HuangI-En LiaoYu-Fang ChungKuen-Tzung ChenPublished in: Inf. Sci. (2013)
Keyphrases
- pattern mining
- intrusion detection system
- wireless sensor networks
- attack detection
- attack scenarios
- intrusion detection
- misuse detection
- data mining techniques
- denial of service attacks
- alert correlation
- malicious activities
- network intrusions
- normal behavior
- cyber attacks
- network attacks
- network security
- data mining
- anomaly detection
- security measures
- normal traffic
- mining algorithm
- computer networks
- graph mining
- frequent pattern mining
- network intrusion detection
- pattern discovery
- network traffic
- sequential pattern mining
- frequent patterns
- network intrusion
- cyber security
- sequential patterns
- interesting patterns
- distributed intrusion detection
- itemsets
- dos attacks
- multistage
- computer systems
- subgroup discovery
- mining frequent
- information systems
- domain driven
- closed patterns
- unauthorized access
- periodic patterns
- ddos attacks
- routing protocol
- knowledge discovery