Journal of Engineering and Applied Sciences
Year:
2016
Volume:
11
Issue:
5
Page No.
1113 - 1121
Proposing an Intrusion Detection System in Energy-Aware Wireless Sensor
Networks Using Neural Networks and Fuzzy Logic-Based Genetic Algorithm
Authors :
Beheshti Asl. Azam
and
Ghaffari. Ali1
References
Agah, A. and S.K. Das, 2007. Preventing dos attacks in wireless sensor networks: A repeated game theory approach. IJ. Network Secur., 5: 145-153.
Ahmed, M.B., M. Salahin, R. Karim, M.A. Razvy and M.M. Hannan
et al., 2007. An efficient method for
in vitro clonal propagation of a newly introduced sweetener plant (
Stevia rebaudiana Bertoni.) in Bangladesh. Am.-Eurasian J. Sci. Res., 2: 121-125.
Direct Link | Chonka, A., Y. Xiang, W. Zhou and A. Bonti, 2011. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Network Comput. Appl., 34: 1097-1107.
Deng, J., R. Han and S. Mishra, 2005. Defending against path-based DoS attacks in wireless sensor networks. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), November 7, 2005, Alexandria, pp: 89-96.
Denning, D.E., 1987. An intrusion-detection model. IEEE Trans. Software Eng., SE-13: 222-232.
CrossRef | Farid, D.M. and M.Z. Rahman, 2010. Anomaly network intrusion detection based on improved self adaptive bayesian algorithm. J. Comput., 5: 23-31.
Sharma, M., 2011. Network intrusion detection system for denial of service attack based on misuse detection. Intl. J. Comput. Eng. Manage., 1: 19-23.
Siler, W. and J.J. Buckley, 2005. Fuzzy Expert Systems and Fuzzy Reasoning. John Wiley and Sons Inc., New York, USA., ISBN-13: 9780471388593, Pages: 405.
Smaha, S.E., 1988. Haystack: An intrusion detection system. Proceedings of the IEEE Conference on Aerospace Computer Security Applications, September 12-16, 1988, IEEE, New York, USA., ISBN: 0-8186-0895-1, pp: 37-44.
Stankovic, J.A., 2006. Wireless Sensor Networks. Department of Computer Science, University of Virginia, Charlottesville, Virginia,.
Teodoro, P.G., J.D. Verdejo, G.M. Fernandez and E. Vazquez, 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur., 28: 18-28.
Direct Link | Tripathi, S., B. Gupta, A. Almomani, A. Mishra and S. Veluru, 2013. Hadoop based defense solution to handle Distributed Denial of Service (DDoS) attacks. J. Inform. Security, 4: 150-164.
CrossRef | Vaccaro, H.S. and G.E. Liepins, 1989. Detection of anomalous computer session activity. Proceedings of the IEEE Symposium on Security and Privacy, May 1-3, 1989, IEEE, New York, USA., ISBN: 0-8186-1939-2, pp: 280-289.