Tedeschi et al., 2017 - Google Patents
Statistically-enhancing the diagnosis of packet losses in WSNsTedeschi et al., 2017
View PDF- Document ID
- 13877205520693233810
- Author
- Tedeschi A
- Midi D
- Benedetto F
- Bertino E
- Publication year
- Publication venue
- International Journal of Mobile Network Design and Innovation
External Links
Snippet
Packet losses, an important class of adverse events in wireless sensor networks, can be caused by either misbehaving nodes, or attacks focused on the wireless links. Understanding the underlying cause is critical for effective response measures to restore …
- 238000003745 diagnosis 0 title description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Upadhyaya et al. | Machine learning-based jamming detection in wireless IoT networks | |
| Sarigiannidis et al. | Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information | |
| Min et al. | Attack-tolerant distributed sensing for dynamic spectrum access networks | |
| Min et al. | Robust cooperative sensing via state estimation in cognitive radio networks | |
| US9485660B2 (en) | Systems and methods to detect and characterize fake cell towers | |
| O’Mahony et al. | Detecting interference in wireless sensor network received samples: A machine learning approach | |
| Fayssal et al. | Anomaly-based behavior analysis of wireless network security | |
| Dasgupta et al. | MMDS: multilevel monitoring and detection system | |
| Alsajri et al. | Enhancing IoT security to leveraging ML for DDoS attack prevention in distributed network routing | |
| Chen et al. | A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks | |
| Choi et al. | Wireless intrusion prevention system using dynamic random forest against wireless MAC spoofing attack | |
| Tedeschi et al. | Statistically-enhancing the diagnosis of packet losses in WSNs | |
| Mendonça et al. | An extremely lightweight approach for ddos detection at home gateways | |
| Min et al. | Robust tracking of small-scale mobile primary user in cognitive radio networks | |
| Hussain et al. | Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks | |
| Midi et al. | Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks | |
| Kailkhura et al. | On the performance analysis of data fusion schemes with Byzantines | |
| Midi et al. | Statistically-enhanced fine-grained diagnosis of packet losses | |
| Yurdagul et al. | Blekeeper: Response time behavior based man-in-the-middle attack detection | |
| Panos et al. | An evaluation of anomaly-based intrusion detection engines for mobile ad hoc networks | |
| AlBusaidi et al. | Analysis of Wireless Sensor Network Security Models: A Salient Approach for Deeper Inspection Using Deep Neural Networks | |
| Avram et al. | Analyzing attacks in wireless ad hoc network with self-organizing maps | |
| An et al. | Efficiency and detectability of random reactive jamming in wireless networks | |
| Lichtman et al. | Anomaly-based intrusion detection of protocol-aware jamming | |
| Akbari et al. | A fault-tolerant cooperative spectrum sensing algorithm over cognitive radio network based on wireless sensor network |