Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 8 of 8
  • Item
    Thumbnail Image
    Discovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving Graphs
    CHAN, J. ; BAILEY, J. ; LECKIE, C. (IEEE Computer Society, 2006)
  • Item
    Thumbnail Image
    A Peer-to-Peer Collaborative Intrusion Detection System
    ZHOU, CV ; KARUNASEKERA, SA ; LECKIE, CA (IEEE - Institute of Electrical and Electronic Engineers, 2005)
  • Item
    Thumbnail Image
    Anomaly detection for Internet worms
    Al-Hammadi, Y ; Leckie, C ; Clemm, A ; Festor, O ; Pras, A (IEEE, 2005)
  • Item
    Thumbnail Image
    Tensor space learning for analyzing activity patterns from video sequences
    Wang, L ; Leckie, C ; Wang, X ; Kotagiri, R ; Bezdek, J (IEEE, 2007-12-01)
  • Item
    Thumbnail Image
    Intrusion detection for routing attacks in sensor networks
    Loo, CE ; Ng, MY ; Leckie, C ; Palaniswami, M (SAGE PUBLICATIONS INC, 2006)
    Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behavior, and then uses this model of normal traffic to detect abnormal traffic patterns. A key advantage of our approach is that it is able to detect attacks that have not previously been seen. Moreover, our detection scheme is based on a set of traffic features that can potentially be applied to a wide range of routing attacks. In order to evaluate our intrusion detection scheme, we have extended a sensor network simulator to generate routing attacks in wireless sensor networks. We demonstrate that our intrusion detection scheme is able to achieve high detection accuracy with a low false positive rate for a variety of simulated routing attacks.
  • Item
    Thumbnail Image
    Survey of network-based defense mechanisms countering the DoS and DDoS problems
    Peng, T ; Leckie, C ; Ramamohanarao, K (ASSOC COMPUTING MACHINERY, 2007-04)
    This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of service attacks. We review the state-of-art mechanisms for defending against denial of service attacks, compare the strengths and weaknesses of each proposal, and discuss potential countermeasures against each defense mechanism. We conclude by highlighting opportunities for an integrated solution to solve the problem of distributed denial of service attacks.
  • Item
    Thumbnail Image
    Information sharing for distributed intrusion detection systems
    Peng, T ; Leckie, C ; Ramamohanarao, K (ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD, 2007-08)
  • Item
    Thumbnail Image
    Approximate clustering in very large relational data
    Bezdek, JC ; Hathaway, RJ ; Huband, JM ; Leckie, C ; Kotagiri, R (WILEY, 2006-08)