Compositional Optimum Network Sensor Utilization System

نویسندگان

  • Marcus Tylutki
  • Jeff Rowe
  • Karl Levitt
چکیده

Currently employed intrusion detection sensor configurations rarely change. This represents a broad, static attack detection domain. Changes within a dynamic environment, due either to policy changes, or changes within the system’s condition, can make certain attacks more important than others. Static scopes will either result in flooding administrators with relatively less important attack reports, or result in the elusion of more important attacks. We present a model which can dynamically incorporate changes within policy and the environment, resulting in autonomic sensor reconfigurations that more accurately detects and reports important attacks within the system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Use of Wireless Sensors for Data Collection in Precision Agriculture

This paper looks at how to optimize data collection from the wireless sensor nodes and analysis of this data for an efficient irrigation scheduling in order to optimize water usage. In this research we design a model system which integrates optimum node placement and data aggregation to see the combined effect on the efficiency of the wireless sensor network (WSN) that is in terms of latency, p...

متن کامل

Performance analysis and classification of Clone attack detection procedures in mobile wireless sensor networks, pdfkeywords=wireless sensor network (WSN), clone attack, intrusion detection, mobility

Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Performance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks

Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...

متن کامل

An Energy Efficient Hybrid routing for Wireless Sensor Network using Fuzzy Logic

Wireless Sensor Networks is a collection of sensor nodes and base station. The nodes have limited battery power. The efficient utilization of sensor node’s energy, clustering is one of the powerful tool. The heterogeneous wireless sensor networks consist of different type of sensor nodes in term of sensing, computation, communication and power. The proposed protocol is An Energy Efficient Hybri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005