On optimal placement of intrusion detection modules in sensor networks

被引:24
作者
Anjum, F [1 ]
Subhadrabandhu, D [1 ]
Sarkar, S [1 ]
Shetty, R [1 ]
机构
[1] Telcordia Technol, App Res, Morristown, NJ USA
来源
FIRST INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS, PROCEEDINGS | 2004年
关键词
D O I
10.1109/BROADNETS.2004.52
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Sensor networks have increasingly become the subject of intense scientific interest over the past few years. In this work we focus on detecting intrusions in sensor networks. The intrusion detection community has been focusing mainly on wired networks. But techniques geared towards wireline networks would not suffice for a sensor environment because of the constraints associated with such networks. In this paper we consider arbitrary sized sensor networks and propose algorithms to improve the detection rates by intelligently enabling the intrusion detection functionality on particular sensor nodes. The proposed algorithms, based on the concepts of minimum cut-set and minimum dominating set, allow for a distributed implementation. The performance of the algorithms in identifying intrusions using signature based detection techniques is studied via simulations.
引用
收藏
页码:690 / 699
页数:10
相关论文
共 14 条
[1]  
[Anonymous], P 2003 IEEE S SEC PR
[2]  
[Anonymous], 2000, COMPUTERS INTRACTABI
[3]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[4]  
ESCHENAUEER L, 2002, ACM CCS NOV
[5]  
FALL K, 1999, NS NOTES DOCUMENTATI
[6]  
HSIN, 2002, WISE 02
[7]  
KAR K, 2001, ITC
[8]  
KO C, 2001, 4 INT S REC ADV INTR, P190
[9]  
Kuhn F., 2003, 22 ACM S PRINCIPLES, P25
[10]  
Marti S., 2000, MOBILE COMPUTING NET