Locating the Attacker of Wormhole Attack by Using the Honeypot.
T. Divya Sai KeerthiPallapa VenkataramPublished in: TrustCom (2012)
Keyphrases
- attack graphs
- digital watermark
- defense mechanisms
- attack scenarios
- attack graph
- forensic analysis
- ddos attacks
- attack detection
- sql injection attacks
- countermeasures
- malicious users
- power analysis
- key exchange protocol
- alert correlation
- real time
- detection mechanism
- flow analysis
- secret key
- intrusion detection system
- wireless sensor networks
- cooperative