A Dynamic Graph-based Cluster Ensemble Approach to Detect Security Attacks in Surveillance Network.
Diya ThomasPublished in: EWSN (2021)
Keyphrases
- network attacks
- security threats
- intrusion detection
- network security
- security measures
- denial of service attacks
- cyber attacks
- intrusion prevention
- traffic analysis
- buffer overflow
- fault injection
- intrusion detection and prevention
- security problems
- security mechanisms
- intrusion detection system
- java card
- computer security
- information security
- security risks
- network administrators
- normal behavior
- malicious nodes
- dos attacks
- countermeasures
- computer networks
- security issues
- security breaches
- key management
- security vulnerabilities
- network management
- denial of service
- normal traffic
- worm detection
- clustering algorithm
- end hosts
- security management
- security protocols
- peer to peer
- wireless sensor networks
- malicious traffic
- border security
- wireless sensor nodes
- stream cipher
- cyber security
- security requirements
- detecting malicious
- security flaws
- security policies
- chosen plaintext