Discovering Flaws in IDS Through Analysis of Their Inputs
نویسندگان
چکیده
To secure Wireless Ad-hoc Networks (WANET) against malicious behaviors, three components are needed: prevention, detection, and response. In this paper, we focus on Intrusion Detection Systems (IDS) for WANET. We classify the different inputs used by the decision process of these IDS, according to their level of cooperation, and the source of their data. We then propose a decision aid which allows automated discovery of attacks for IDS, according to the inputs used. Finally we apply our framework to discover weaknesses in two existing IDS.
منابع مشابه
Efficiency measurement of health care organizations: What models are used?
Background: Literature abounds with various techniques for efficiency measurement of health care organizations (HCOs), which should be used cautiously and appropriately. The present study aimed at discovering the rules regulating the interplay among the number of inputs, outputs, and decision- making units (DMUs) and identifying all methods used for the measurement of Iranian HCOs and criticall...
متن کاملTRINETR: Facilitating Alerts Analysis and Response Decision Making
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...
متن کاملNetwork Data Envelopment Analysis Models For Measuring Efficiency Of a Four-Stage Supply Chain With Returned Outputs
In this paper using DEA technique, four-stage DEA model mooted in order to consider the situation in which returned products exist. Returned products are the inputs of the previous sub-processes that need to be reprocessed due to existence of flaws. Here, a supply chain with four stages as supplier, manufacture, distributor, and retailer with intermediate and return products has been considered...
متن کاملA review of text mining approaches and their function in discovering and extracting a topic
Background and aim: Four text mining methods are examined and focused on understanding and identifying their properties and limitations in subject discovery. Methodology: The study is an analytical review of the literature of text mining and topic modeling. Findings: LSA could be used to classify specific and unique topics in documents that address only a single topic. The other three text min...
متن کاملRelationship of Lifestyle and Attachment to God with Depression Mediated by Quality of Life among Mothers of Children with Intellectual Disabilities
Background: Mothers often bear a heavy psychological burden in society due to their disabled children. As mothers often spend more time taking care of these children, they are exposed to different types of stress and mental disorders. The present study aimed to investigate the relationship between lifestyle and attachment to God with depression with the mediating role of quality of life (QoL) i...
متن کامل