This HTML5 document contains 42 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n11http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n14http://purl.org/net/nknouf/ns/bibtex#
n17http://localhost/temp/predkladatel/
n12http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F09%3A00044286%21RIV11-MSM-14330___/
n16http://linked.opendata.cz/resource/domain/vavai/projekt/
n10http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n19http://linked.opendata.cz/ontology/domain/vavai/
n15https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n18http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F09%3A00044286%21RIV11-MSM-14330___
rdf:type
skos:Concept n19:Vysledek
dcterms:description
Wireless sensor networks cannot be secured against internal attacker with only cryptographic techniques because their nodes are not physically protected and can be easily captured by the attacker. Therefore, in this work we consider intrusion detection systems that monitor behavior of sensor nodes and detect the malicious ones among them. Our work is exploratory in that we propose metrics for evaluation of these systems. There are evaluation metrics for intrusion detection systems for conventional wired and wireless networks. However, to our best knowledge there is no work that proposes evaluation metrics for intrusion detection systems for wireless sensor networks. We divide the proposed metrics into two groups. In the first group there are metrics for detection techniques without a response mechanism. In the second group there are metrics for detection techniques together with a response mechanism. Wireless sensor networks cannot be secured against internal attacker with only cryptographic techniques because their nodes are not physically protected and can be easily captured by the attacker. Therefore, in this work we consider intrusion detection systems that monitor behavior of sensor nodes and detect the malicious ones among them. Our work is exploratory in that we propose metrics for evaluation of these systems. There are evaluation metrics for intrusion detection systems for conventional wired and wireless networks. However, to our best knowledge there is no work that proposes evaluation metrics for intrusion detection systems for wireless sensor networks. We divide the proposed metrics into two groups. In the first group there are metrics for detection techniques without a response mechanism. In the second group there are metrics for detection techniques together with a response mechanism.
dcterms:title
Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks
skos:prefLabel
Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks Effectiveness Metrics for Intrusion Detection in Wireless Sensor Networks
skos:notation
RIV/00216224:14330/09:00044286!RIV11-MSM-14330___
n3:aktivita
n8:S n8:P
n3:aktivity
P(LA09016), S
n3:dodaniDat
n5:2011
n3:domaciTvurceVysledku
n10:4292715 n10:8881162
n3:druhVysledku
n4:D
n3:duvernostUdaju
n13:S
n3:entitaPredkladatele
n12:predkladatel
n3:idSjednocenehoVysledku
312355
n3:idVysledku
RIV/00216224:14330/09:00044286
n3:jazykVysledku
n18:eng
n3:klicovaSlova
evaluation metrics; intrusion detection system; wireless sensor network
n3:klicoveSlovo
n7:intrusion%20detection%20system n7:wireless%20sensor%20network n7:evaluation%20metrics
n3:kontrolniKodProRIV
[9777F40556CF]
n3:mistoKonaniAkce
Milano, Italy
n3:mistoVydani
Los Alamitos (CA, USA)
n3:nazevZdroje
EC2ND 2009 : European Conference on Computer Network Defense
n3:obor
n21:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:projekt
n16:LA09016
n3:rokUplatneniVysledku
n5:2009
n3:tvurceVysledku
Stetsko, Andriy Matyáš, Václav
n3:typAkce
n11:WRD
n3:zahajeniAkce
2009-11-09+01:00
s:numberOfPages
8
n14:hasPublisher
IEEE Computer Society
n15:isbn
978-0-7695-3983-6
n17:organizacniJednotka
14330