English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4203155      Online Users : 523
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/22626


    Title: Intrusion detection mechanisms based on queuing theory in remote distribution sensor networks
    Authors: Lin, H.-Y.a , Chiang, T.-C.b
    Contributors: Department of Information Management, Tunghai University
    Keywords: DDoS;Queuing theory;Sensor network
    Date: 2010-07-20
    Issue Date: 2013-05-21T09:12:42Z (UTC)
    Publisher: Qingdao; China
    Abstract: Recently, sensor networks are usually applied on collecting remote sensing information. The deployed sensor nodes are separated and responsible for specific purposes, and act as an individual device. They cooperatively transmit sensed data to the base station, as shown in Fig. 1. However, the transmitted data are exposed to open environments, and possibly contain confidential information. If malicious attacks interfere in the communication using huge packets to break the communication, thus the system can not work properly. In general, attackers exploit a broadcast storm or a Distributed Denial-of-Service (DDoS) attack to paralyze the entire network. Therefore, this study proposes a queuing theory based scheme to detect whether the system encounters malicious attacks. Our proposed scheme provides the arrival requests with a queuing service on the base station, which is responsible for dealing with transmitted jobs. Once the jammed traffic is anomalous for long periods, the system immediately detects the malicious attacks using our proposed approach. ? (2010) Trans Tech Publications, Switzerland.
    Relation: Advanced Materials Research
    Volume 121-122, 2010, Pages 58-63
    Appears in Collections:[資訊管理學系所] 會議論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML226View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback