Limits...
RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

Amin SO, Siddiqui MS, Hong CS, Lee S - Sensors (Basel) (2009)

Bottom Line: By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks.Other aspects, such as creation of rules are not discussed.We also investigate the settings and their effects on the performance of related parameters for both of the components.

View Article: PubMed Central - PubMed

Affiliation: Department of Computer Engineering, School of Electronics and Information, Kyung Hee University, Korea; E-Mails: obaid@networking.khu.ac.kr (S.O.A.); shoaib@networking.khu.ac.kr (M.S.S.); drsungwon@khu.ac.kr (S.-W.L.).

ABSTRACT
The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

No MeSH data available.


Related in: MedlinePlus

Probability of signature-code collision with respect to φ, m and n with ⊖ = 2.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC3297149&req=5

f7-sensors-09-03447: Probability of signature-code collision with respect to φ, m and n with ⊖ = 2.

Mentions: As the signature-code collision occurs only when all of the hash functions, involved in the construction of signature-code, collide. Therefore, the probability of signature-code collision can be given by . Figure 7 depicts the effects of φ, m and n on signature-code for ⊖ = 2. We can see that as we increase the size of bit array m the probability of hash collision becomes low. On the other hand, as we increase the probability φi the probability of hash collision approaches 1.


RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

Amin SO, Siddiqui MS, Hong CS, Lee S - Sensors (Basel) (2009)

Probability of signature-code collision with respect to φ, m and n with ⊖ = 2.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC3297149&req=5

f7-sensors-09-03447: Probability of signature-code collision with respect to φ, m and n with ⊖ = 2.
Mentions: As the signature-code collision occurs only when all of the hash functions, involved in the construction of signature-code, collide. Therefore, the probability of signature-code collision can be given by . Figure 7 depicts the effects of φ, m and n on signature-code for ⊖ = 2. We can see that as we increase the size of bit array m the probability of hash collision becomes low. On the other hand, as we increase the probability φi the probability of hash collision approaches 1.

Bottom Line: By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks.Other aspects, such as creation of rules are not discussed.We also investigate the settings and their effects on the performance of related parameters for both of the components.

View Article: PubMed Central - PubMed

Affiliation: Department of Computer Engineering, School of Electronics and Information, Kyung Hee University, Korea; E-Mails: obaid@networking.khu.ac.kr (S.O.A.); shoaib@networking.khu.ac.kr (M.S.S.); drsungwon@khu.ac.kr (S.-W.L.).

ABSTRACT
The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

No MeSH data available.


Related in: MedlinePlus