Towards multisensor data fusion for DoS detection
Proceedings of the 2004 ACM symposium on Applied computing
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
IEEE Internet Computing
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Data fusion algorithms for network anomaly detection: classification and evaluation
ICNS '07 Proceedings of the Third International Conference on Networking and Services
Cross-Layer Based Anomaly Detection in Wireless Mesh Networks
SAINT '09 Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet
Fault Tolerance by Quartile Method in Wireless Sensor and Actor Networks
CISIS '10 Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
Temporal Data Mining
Detecting identity spoofs in IEEE 802.11e wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A cross-layer approach to detect jamming attacks in wireless ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A signal detection system based on Dempster-Shafer theory andcomparison to fuzzy detection
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Hi-index | 0.00 |
Wireless networks are becoming susceptible to increasingly more sophisticated threats. Most of the current intrusion detection systems IDSs that employ multi-layer techniques for mitigating network attacks offer better performance than IDSs that employ single layer approach. However, few of the current multi-layer IDSs could be used off-the-shelf without prior thorough training with completely clean datasets or a fine tuning period. Dempster-Shafer theory has been used with the purpose of combining beliefs of different metric measurements across multiple layers. However, an important step to be investigated remains open; this is to find an automatic and self-adaptive process of basic probability assignment BPA. This paper describes a novel BPA methodology able to automatically adapt its detection capabilities to the current measured characteristics, without intervention from the IDS administrator. We have developed a multi-layer-based application able to classify individual network frames as normal or malicious with perfect detection accuracy.