Anomaly detection in wireless sensor networks: A survey

[1]  Ayman I. Kayssi,et al.  Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[2]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[3]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[4]  Shervin Erfani,et al.  Survey of multipath routing protocols for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..

[5]  Sajal K. Das,et al.  Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.

[6]  Qiang Shen,et al.  New Approaches to Fuzzy-Rough Feature Selection , 2009, IEEE Transactions on Fuzzy Systems.

[7]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[8]  Hsiao-Hwa Chen,et al.  Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm , 2009, 2009 IEEE International Conference on Communications.

[9]  Zheng Yuan,et al.  Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[10]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[11]  Marius Kloft,et al.  Automatic feature selection for anomaly detection , 2008, AISec '08.

[12]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[13]  Myong-Soon Park,et al.  Inside Attacker Detection in Hierarchical Wireless Sensor Network , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[14]  Mansoor Alam,et al.  Compromised Sensor Nodes Detection: A Quantitative Approach , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[15]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[16]  Jianying Zhou,et al.  Wireless Sensor Network Security , 2008 .

[17]  Kotagiri Ramamohanarao,et al.  Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.

[18]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[19]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[20]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[21]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[22]  Deborah A. Frincke,et al.  From intrusion detection to self-protection , 2007, Comput. Networks.

[23]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[24]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[25]  Dimitrios Gunopulos,et al.  Online outlier detection in sensor data using non-parametric models , 2006, VLDB.

[26]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[27]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[28]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[29]  Ali Miri,et al.  An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[30]  Ali Miri,et al.  A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[31]  Ajith Abraham,et al.  Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..

[32]  Jie Wu,et al.  Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[33]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[34]  K. Basu,et al.  A non-cooperative game approach for intrusion detection in sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[35]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[36]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[37]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[38]  Deborah A. Frincke,et al.  Towards survivable intrusion detection system , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[39]  Dimitrios Gunopulos,et al.  Distributed deviation detection in sensor networks , 2003, SGMD.

[40]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[41]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[42]  Miao Xie,et al.  Anomaly Detection in Wireless Sensor Networks , 2013 .

[43]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[44]  Muhammad Ibrahim,et al.  SPINS: Security Protocols for Sensor Networks , 2011 .

[45]  Sutharshan Rajasegarar,et al.  Anomaly detection by clustering ellipsoids in wireless sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[46]  Raman K. Mehra,et al.  Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks , 2008, Inf. Fusion.

[47]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[48]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[49]  Ling Huang,et al.  Distributed PCA and Network Anomaly Detection , 2006 .

[50]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[51]  Song Han,et al.  Taxonomy of Attacks on Wireless Sensor Networks , 2006 .

[52]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[53]  John C. Knight,et al.  Towards Survivable Intrusion Detection , 2000 .

[54]  Stefan Axelsson Research in Intrusion-Detection Systems: A Survey , 1998 .