- Computing and Information Systems - Research Publications
Computing and Information Systems - Research Publications
Permanent URI for this collection
Search Results
Now showing
1 - 8 of 8
-
ItemDiscovering and Summarising Regions of Correlated Spatio-Temporal Change in Evolving GraphsCHAN, J. ; BAILEY, J. ; LECKIE, C. (IEEE Computer Society, 2006)
-
ItemA Peer-to-Peer Collaborative Intrusion Detection SystemZHOU, CV ; KARUNASEKERA, SA ; LECKIE, CA (IEEE - Institute of Electrical and Electronic Engineers, 2005)
-
ItemAnomaly detection for Internet wormsAl-Hammadi, Y ; Leckie, C ; Clemm, A ; Festor, O ; Pras, A (IEEE, 2005)
-
ItemTensor space learning for analyzing activity patterns from video sequencesWang, L ; Leckie, C ; Wang, X ; Kotagiri, R ; Bezdek, J (IEEE, 2007-12-01)
-
ItemIntrusion detection for routing attacks in sensor networksLoo, CE ; Ng, MY ; Leckie, C ; Palaniswami, M (SAGE PUBLICATIONS INC, 2006)Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behavior, and then uses this model of normal traffic to detect abnormal traffic patterns. A key advantage of our approach is that it is able to detect attacks that have not previously been seen. Moreover, our detection scheme is based on a set of traffic features that can potentially be applied to a wide range of routing attacks. In order to evaluate our intrusion detection scheme, we have extended a sensor network simulator to generate routing attacks in wireless sensor networks. We demonstrate that our intrusion detection scheme is able to achieve high detection accuracy with a low false positive rate for a variety of simulated routing attacks.
-
ItemSurvey of network-based defense mechanisms countering the DoS and DDoS problemsPeng, T ; Leckie, C ; Ramamohanarao, K (ASSOC COMPUTING MACHINERY, 2007-04)This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of service attacks. We review the state-of-art mechanisms for defending against denial of service attacks, compare the strengths and weaknesses of each proposal, and discuss potential countermeasures against each defense mechanism. We conclude by highlighting opportunities for an integrated solution to solve the problem of distributed denial of service attacks.
-
ItemInformation sharing for distributed intrusion detection systemsPeng, T ; Leckie, C ; Ramamohanarao, K (ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD, 2007-08)
-
ItemApproximate clustering in very large relational dataBezdek, JC ; Hathaway, RJ ; Huband, JM ; Leckie, C ; Kotagiri, R (WILEY, 2006-08)