A Novel Intrusion Detection System for Smart Space

With the wide spread of computers, our daily lives are highly computerised and closely connected with computer networks. In the near future, one will be able to open a door by simply sending an order to the electric door lock from his/her PDA, or read news on a computer embedded “e-paper” with the content updated through wireless connections. The trend towards a computerised smart space is part of the conception of ubiquitous computing (Weiser 1991). In the era of ubiquitous computing, devices with computing and communicating abilities will surround us all over. Eventually it will achieve the non-intrusive availability of computers throughout physical environments. AbsTRACT

[1]  Mark Weiser The computer for the 21st century , 1991 .

[2]  Andrew E. Fano,et al.  The future of business services in the age of ubiquitous computing , 2002, CACM.

[3]  Paul Dourish,et al.  Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision , 2007, Personal and Ubiquitous Computing.

[4]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[5]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[6]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[7]  Eugene H. Spafford,et al.  Intrusion detection using autonomous agents , 2000, Comput. Networks.

[8]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[9]  R. W. Peterson,et al.  OPTICAL INTERFEROMETRY OF SURFACES , 1991 .

[10]  Tracy Camp,et al.  Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.

[11]  Qi Shi,et al.  Balancing intrusion detection resources in ubiquitous computing networks , 2008, Comput. Commun..

[12]  Qi Zhang,et al.  Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..

[13]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[14]  Bonnie S. Heck-Ferri,et al.  Simulation of large-scale sensor networks using GTSNetS , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[15]  Jingyuan Zhang,et al.  Power-aware routing protocols in ad hoc wireless networks , 2005, IEEE Wireless Communications.

[16]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[17]  Biswanath Mukherjee,et al.  A system for distributed intrusion detection , 1991, COMPCON Spring '91 Digest of Papers.

[18]  Qi Shi,et al.  Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[19]  Chhaya Das,et al.  Analysis of Distributed Intrusion Detection Systems Using Mobile Agents , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[20]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[21]  Christopher Krügel,et al.  SPARTA, a Mobile Agent Based Instrusion Detection System , 2001, Network Security.