Discovering Flaws in IDS Through Analysis of Their Inputs

نویسندگان

  • Raphaël Jamet
  • Pascal Lafourcade
چکیده

To secure Wireless Ad-hoc Networks (WANET) against malicious behaviors, three components are needed: prevention, detection, and response. In this paper, we focus on Intrusion Detection Systems (IDS) for WANET. We classify the different inputs used by the decision process of these IDS, according to their level of cooperation, and the source of their data. We then propose a decision aid which allows automated discovery of attacks for IDS, according to the inputs used. Finally we apply our framework to discover weaknesses in two existing IDS.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficiency measurement of health care organizations: What models are used?

Background: Literature abounds with various techniques for efficiency measurement of health care organizations (HCOs), which should be used cautiously and appropriately. The present study aimed at discovering the rules regulating the interplay among the number of inputs, outputs, and decision- making units (DMUs) and identifying all methods used for the measurement of Iranian HCOs and criticall...

متن کامل

TRINETR: Facilitating Alerts Analysis and Response Decision Making

Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...

متن کامل

Network ‎D‎ata Envelopment Analysis Models For Measuring Efficiency Of a Four-Stage Supply Chain With Returned Outputs‎

In this paper using DEA technique, four-stage DEA model mooted in order to consider the situation in which returned products exist. Returned products are the inputs of the previous sub-processes that need to be reprocessed due to existence of flaws. Here, a supply chain with four stages as supplier, manufacture, distributor, and retailer with intermediate and return products has been considered...

متن کامل

A review of text mining approaches and their function in discovering and extracting a topic

Background and aim: Four text mining methods are examined and focused on understanding and identifying their properties and limitations in subject discovery. Methodology: The study is an analytical review of the literature of text mining and topic modeling.  Findings: LSA could be used to classify specific and unique topics in documents that address only a single topic. The other three text min...

متن کامل

Relationship of Lifestyle and Attachment to God with Depression Mediated by Quality of Life among Mothers of Children with Intellectual Disabilities

Background: Mothers often bear a heavy psychological burden in society due to their disabled children. As mothers often spend more time taking care of these children, they are exposed to different types of stress and mental disorders. The present study aimed to investigate the relationship between lifestyle and attachment to God with depression with the mediating role of quality of life (QoL) i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013