Skip Nav Destination
ASME Press Select Proceedings
International Conference on Advanced Computer Theory and Engineering, 5th (ICACTE 2012)
Editor
ISBN:
9780791860045
No. of Pages:
938
Publisher:
ASME Press
Publication date:
2012
eBook Chapter
113 Design and Implementation of an Anomaly-Based Intrusion Detection System for Wireless Industrial Networks
Page Count:
8
-
Published:2012
Citation
Min, W, Keecheon, K, & Ping, W. "Design and Implementation of an Anomaly-Based Intrusion Detection System for Wireless Industrial Networks." International Conference on Advanced Computer Theory and Engineering, 5th (ICACTE 2012). Ed. Yi, X. ASME Press, 2012.
Download citation file:
This paper describes an anomaly-based intrusion detection system in wireless industrial networks. The proposed system has more reliability in comparison of its analogues and consumes the resources more efficiently. We consider the problem of finding an anomaly-based intrusion detection system for wireless industrial network, which focuses on hybrid mesh and star network topology, a third party intrusion system and the feedback mechanism that can significantly detect intrusion. Finally, the test results illustrate that these measures may enhance the security reliability of wireless industrial network communication.
1. Introduction
2. Network Model and Requirement Analysis
3. Anomaly-Based Intrusion Detection Architecture
4. Security Protocol Stack
5. Security Test and Result Analysis
6. Summaries
7. Acknowledgment
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
High Perfermance Snort Architecture Design Based on Network Application Processor
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
The Research and Design of Intrusion Detection System in IPV6 Network
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)
BitPredator: A Discovery Algorithm for BitTorrent Initial Seeders and Peers
International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011)
Application of Fuzzy Clustering Algorithm in Intrusion Detection System
International Symposium on Information Engineering and Electronic Commerce, 3rd (IEEC 2011)
Related Articles
Alert Correlation for Detecting Cyber-Manufacturing Attacks and Intrusions
J. Comput. Inf. Sci. Eng (February,2020)
Intrusion Detection System for Cyber-Manufacturing System
J. Manuf. Sci. Eng (March,2019)
Creative Contributions of the Methods of Inventive Principles of TRIZ and BioTRIZ to Problem Solving
J. Mech. Des (August,2017)