- Computing and Information Systems - Research Publications
Computing and Information Systems - Research Publications
Permanent URI for this collection
Search Results
Now showing
1 - 10 of 12
-
ItemIntrusion detection for routing attacks in sensor networksLoo, CE ; Ng, MY ; Leckie, C ; Palaniswami, M (SAGE PUBLICATIONS INC, 2006)Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behavior, and then uses this model of normal traffic to detect abnormal traffic patterns. A key advantage of our approach is that it is able to detect attacks that have not previously been seen. Moreover, our detection scheme is based on a set of traffic features that can potentially be applied to a wide range of routing attacks. In order to evaluate our intrusion detection scheme, we have extended a sensor network simulator to generate routing attacks in wireless sensor networks. We demonstrate that our intrusion detection scheme is able to achieve high detection accuracy with a low false positive rate for a variety of simulated routing attacks.
-
ItemProtecting SIP Server from CPU-Based DoS Attacks using History-Based IP FilteringZhou, CV ; Leckie, C ; Ramamohanarao, K (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2009-10)
-
ItemSurvey of network-based defense mechanisms countering the DoS and DDoS problemsPeng, T ; Leckie, C ; Ramamohanarao, K (ASSOC COMPUTING MACHINERY, 2007-04)This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of service attacks. We review the state-of-art mechanisms for defending against denial of service attacks, compare the strengths and weaknesses of each proposal, and discuss potential countermeasures against each defense mechanism. We conclude by highlighting opportunities for an integrated solution to solve the problem of distributed denial of service attacks.
-
ItemInformation sharing for distributed intrusion detection systemsPeng, T ; Leckie, C ; Ramamohanarao, K (ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD, 2007-08)
-
ItemA survey of coordinated attacks and collaborative intrusion detectionZhou, CV ; Leckie, C ; Karunasekera, S (ELSEVIER ADVANCED TECHNOLOGY, 2010-02)
-
ItemDiscovering correlated spatio-temporal changes in evolving graphsChan, J ; Bailey, J ; Leckie, C (SPRINGER LONDON LTD, 2008-07)
-
ItemSelective Sampling for Approximate Clustering of Very Large Data SetsWANG, L. ; BEZDEK, J. ; LECKIE, C. ; KOTAGIRI, R. ( 2008)
-
ItemApproximate clustering in very large relational dataBezdek, JC ; Hathaway, RJ ; Huband, JM ; Leckie, C ; Kotagiri, R (WILEY, 2006-08)
-
ItemUsing graph partitioning to discover regions of correlated spatio-temporal change in evolving graphsChan, J ; Bailey, J ; Leckie, C (IOS PRESS, 2009)
-
ItemEnhanced Visual Analysis for Cluster Tendency Assessment and Data PartitioningWang, L ; Geng, X ; Bezdek, J ; Leckie, C ; Ramamohanarao, K (IEEE COMPUTER SOC, 2010-10)