Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 5
Page No. 1113 - 1121

Proposing an Intrusion Detection System in Energy-Aware Wireless Sensor Networks Using Neural Networks and Fuzzy Logic-Based Genetic Algorithm

Authors : Beheshti Asl. Azam and Ghaffari. Ali1

References

Agah, A. and S.K. Das, 2007. Preventing dos attacks in wireless sensor networks: A repeated game theory approach. IJ. Network Secur., 5: 145-153.

Ahmed, M.B., M. Salahin, R. Karim, M.A. Razvy and M.M. Hannan et al., 2007. An efficient method for in vitro clonal propagation of a newly introduced sweetener plant (Stevia rebaudiana Bertoni.) in Bangladesh. Am.-Eurasian J. Sci. Res., 2: 121-125.
Direct Link  |  

Chonka, A., Y. Xiang, W. Zhou and A. Bonti, 2011. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Network Comput. Appl., 34: 1097-1107.

Deng, J., R. Han and S. Mishra, 2005. Defending against path-based DoS attacks in wireless sensor networks. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), November 7, 2005, Alexandria, pp: 89-96.

Denning, D.E., 1987. An intrusion-detection model. IEEE Trans. Software Eng., SE-13: 222-232.
CrossRef  |  

Farid, D.M. and M.Z. Rahman, 2010. Anomaly network intrusion detection based on improved self adaptive bayesian algorithm. J. Comput., 5: 23-31.

Sharma, M., 2011. Network intrusion detection system for denial of service attack based on misuse detection. Intl. J. Comput. Eng. Manage., 1: 19-23.

Siler, W. and J.J. Buckley, 2005. Fuzzy Expert Systems and Fuzzy Reasoning. John Wiley and Sons Inc., New York, USA., ISBN-13: 9780471388593, Pages: 405.

Smaha, S.E., 1988. Haystack: An intrusion detection system. Proceedings of the IEEE Conference on Aerospace Computer Security Applications, September 12-16, 1988, IEEE, New York, USA., ISBN: 0-8186-0895-1, pp: 37-44.

Stankovic, J.A., 2006. Wireless Sensor Networks. Department of Computer Science, University of Virginia, Charlottesville, Virginia,.

Teodoro, P.G., J.D. Verdejo, G.M. Fernandez and E. Vazquez, 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur., 28: 18-28.
Direct Link  |  

Tripathi, S., B. Gupta, A. Almomani, A. Mishra and S. Veluru, 2013. Hadoop based defense solution to handle Distributed Denial of Service (DDoS) attacks. J. Inform. Security, 4: 150-164.
CrossRef  |  

Vaccaro, H.S. and G.E. Liepins, 1989. Detection of anomalous computer session activity. Proceedings of the IEEE Symposium on Security and Privacy, May 1-3, 1989, IEEE, New York, USA., ISBN: 0-8186-1939-2, pp: 280-289.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved