Attack Resilient Trust and Signature-based Intrusion Detection Systems

被引:0
|
作者
Kabaso, Boniface [1 ]
Aradeh, Saber A. [1 ]
Abidoye, Ademola P. [1 ]
机构
[1] Cape Peninsula Univ Technol, Dept Informat Technol, Cape Town, South Africa
关键词
Wireless sensor network; routing attacks; public-key cryptography; packet dropping; denial of service attacks; WIRELESS SENSOR NETWORKS; INFORMATION; PROTOCOLS;
D O I
10.14569/IJACSA.2021.0120381
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks have been widely applied in many areas due to their unique characteristics. These have exposed them to different types of active and passive attacks. In the literature, several solutions have been proposed to mitigate these attacks. Most of the proposed solutions are too complex to be implemented in wireless sensor networks considering the resource-constraint of sensor nodes. In this work, we proposed a hierarchical trust mechanism based on clustering approach to detect and prevent denial of service attacks in wireless sensor networks. The approach was validated through simulation using Network Simulator (NS2). The following metrics were used to evaluation the proposed scheme: packet delivery ratio, network lifetime, routing delay, overhead, and number of nodes. The proposed approach is capable of detecting compromised sensor nodes vulnerable to a denial of service attacks. Moreover, it is able to detect all sensed data that have been compromised during transmission to the base station. The results show that our method can effectively detect and defend against denial of service attacks in sensor wireless sensor networks.
引用
收藏
页码:701 / 707
页数:7
相关论文
共 50 条
  • [1] A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
    Masdari, Mohammad
    Khezri, Hemn
    [J]. APPLIED SOFT COMPUTING, 2020, 92 (92)
  • [2] On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
    Diaz-Verdejo, Jesus
    Munoz-Calle, Javier
    Estepa Alonso, Antonio
    Estepa Alonso, Rafael
    Madinabeitia, German
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [3] A hybrid alarm management strategy in signature-based intrusion detection systems
    Munoz Cortes, Francisco
    Gaviria Gomez, Natalia
    [J]. 2019 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM 2019), 2019,
  • [4] Analysis of update delays in signature-based network intrusion detection systems
    Gascon, Hugo
    Orfila, Agustin
    Blasco, Jorge
    [J]. COMPUTERS & SECURITY, 2011, 30 (08) : 613 - 624
  • [5] Variables influencing the effectiveness of signature-based network intrusion detection systems
    Sommestad, Teodor
    Holm, Hannes
    Steinvall, Daniel
    [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 711 - 728
  • [6] Characterizing Realistic Signature-based Intrusion Detection Benchmarks
    Aldwairi, Monther
    Alshboul, Mohammad A.
    Seyam, Asmaa
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 97 - 103
  • [7] False alarm minimization techniques in signature-based intrusion detection systems: A survey
    Hubballi, Neminath
    Suryanarayanan, Vinoth
    [J]. COMPUTER COMMUNICATIONS, 2014, 49 : 1 - 17
  • [8] CBSigIDS: Towards Collaborative Blockchained Signature-based Intrusion Detection
    Tug, Steven
    Meng, Weizhi
    Wang, Yu
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1228 - 1235
  • [9] Using decision trees to improve signature-based intrusion detection
    Kruegel, C
    Toth, T
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 173 - 191
  • [10] USAID: Unifying signature-based and anomaly-based intrusion detection
    Li, ZW
    Das, A
    Zhou, JY
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 702 - 712