Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Detecting disruptive routers: a distributed network monitoring approach
IEEE Network: The Magazine of Global Internetworking
An analysis of distributed sensor data aggregation for network intrusion detection
Microprocessors & Microsystems
Secure Ubiquitous Health Monitoring System
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
Detection of slow malicious worms using multi-sensor data fusion
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Secure communication among cell phones and sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
SafeVchat: detecting obscene content and misbehaving users in online video chat services
Proceedings of the 20th international conference on World wide web
Prioritizing intrusion analysis using Dempster-Shafer theory
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Automatically building datasets of labeled IP traffic traces: A self-training approach
Applied Soft Computing
An epistemic event-based correlation approach for managing pervasive networks
International Journal of Network Management
Multi-modal biometric approach to enable high security in mobile adhoc network
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Two-stage database intrusion detection by combining multiple evidence and belief update
Information Systems Frontiers
SafeVchat: A System for Obscene Content Detection in Online Video Chat Services
ACM Transactions on Internet Technology (TOIT)
An automatic and self-adaptive multi-layer data fusion system for WiFi attack detection
International Journal of Internet Technology and Secured Transactions
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles
Computer Communications
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Without a fixed security infrastructure, mobile ad hoc networks must distribute intrusion detection among their nodes. But even though a distributed intrusion detection system can combine data from multiple nodes to estimate the likelihood of an intrusion, the observing nodes might not be reliable. The Dempster-Shafer theory of evidence is well suited for this type of problem because it reflects uncertainty. Moreover, Dempster驴s rule for combination gives a numerical procedure for fusing together multiple pieces of evidence from unreliable observers. The authors review the Dempster-Shafer theory in the context of distributed intrusion detection and demonstrate the theory驴s usefulness.