Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Performance Testing An Inline Network Intrusion Detection System Using Snort, Richard Wagoner Nov 2007

Performance Testing An Inline Network Intrusion Detection System Using Snort, Richard Wagoner

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Richard Wagoner on November 16, 2007.


Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews Apr 2007

Detecting Compromised Nodes In Wireless Sensor Networks, Mary Lisa Mathews

Electrical & Computer Engineering Theses & Dissertations

While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are utilized have sensitive data. Therefore, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if measures are not taken to deal with this event. There have been many approaches researched to tackle the issue. In this thesis, an anomaly-based intrusion detection protocol is developed to detect compromised nodes in wireless sensor networks.

The proposed protocol is implemented after the sensors are deployed into the environment in which they …