dc.contributor.advisor | Vassiliou, Vasos | en |
dc.contributor.author | Ioannou, Christiana A. | en |
dc.coverage.spatial | Κύπρος | el |
dc.coverage.spatial | Cyprus | en |
dc.creator | Ioannou, Christiana A. | en |
dc.date.accessioned | 2017-03-27T05:30:08Z | |
dc.date.accessioned | 2017-08-03T10:45:18Z | |
dc.date.available | 2017-03-27T05:30:08Z | |
dc.date.available | 2017-08-03T10:45:18Z | |
dc.date.issued | 2017-02 | |
dc.date.submitted | 2017-02-15 | |
dc.identifier.uri | https://gnosis.library.ucy.ac.cy/handle/7/39544 | en |
dc.description | Includes bibliography (p. 155-165). | en |
dc.description | Number of sources in the bibliography: 114 | en |
dc.description | Thesis (Ph. D.) -- University of Cyprus, Faculty of Pure and Applied Sciences, Department of Computer Science, 2017. | en |
dc.description | The University of Cyprus Library holds the printed form of the thesis. | en |
dc.description.abstract | Η ομαδοποίηση (clustering) αποσκοπεί στη διαίρεση των αντικειμένων σε ομάδες βάση διαφόρων κριτηρίων. Σε πραγματικά δίκτυα πληροφοριών, κάθε χαρακτηριστικό των αντικειμένων, π.χ. ιδιότητες και τύποι συνδέσεων, περιέχει διαφορετική πληροφορία, και ορισμένα από αυτά τα χαρακτηριστικά μπορεί να μην είναι χρήσιμα στην διαδικασία ομαδοποίησης. Επομένως, πρέπει να προσδιορίσουμε πόσο σημαντική είναι η κάθε ιδιότητας και ο κάθε τύπος ακμής. Όταν η διαδικασία ομαδοποίησης λαμβάνει υπόψη το πόσο σημαντικά είναι τα χαρακτηριστικά των αντικειμένων επιτυγχάνει αποτελέσματα υψηλής ποιότητας. | el |
dc.description.abstract | Wireless sensor networks are used for critical applications due to their ability to provide low-cost, low-power, and diversified monitoring services. They also attract people with malicious intent who aim in disrupting the network by any means possible. Existing security methods fail in identifying unknown malicious attacks and require memory and power which are limited resources for WSNs.
Intrusion Detection Systems (IDS) are found at the second line of security defense. They are engaged once the intruder has penetrated the first line of defense, the preventive layer. Most intrusion detection solutions for WSNs in the literature, are evaluated using simulation tools or mathematical models.
We propose and evaluate mIDS; a run-time, low-memory overhead IDS that can detect unknown attacks by imposing minimum computation power.
We implemented a monitoring tool in Contiki O/S, called RMT, that monitors and collects data from multiple network layers, in real time. RMT gathers statistics from the various sensor node's layers that can be customized to decrease memory cost.
RMT provides monitoring information to an anomaly IDS, called mIDS, that detects attacks within the network. At an offline stage the data gathered from the RMT monitoring is analysed using the profiling statistical Binary Logistic Regression (BLR) to define normal sensor activity.
To have a fine grain detection model both benign and viral behaviors are included to form the plane of what is normal behavior. We implemented routing WSN attacks that take advantage of the routing layer vulnerabilities to infect the sensor node.
At run time, mIDS uses input data from RMT and the normal activity profile to detect abnormalities within the network. At prede_ned intervals mIDS analyses sensor node activity using the probability equation extracted at the offline stage using BLR. mIDS is currently installed at the constrained nodes and it is responsible for monitoring local sensor behavior.
We developed BLR models for the routing and the MAC network layers to detect routing attacks. The BLR models that achieved 96% - 100% accuracy levels were the ones trained with routing layer data. We developed BLR models for each attack implemented and evaluated real time in three different topologies. Depending which BLR model raised an alarm, we can classify the type of the attack if it has Selective Forward and/or Blackhole or if the attack is of type Sinkhole. The BLR model for Sinkhole attack detected, in all network topologies the attack with no false alarms. | en |
dc.format.extent | 176 p. : ill. (some col.), diagrs., tables ; 30 cm. | en |
dc.language.iso | eng | en |
dc.publisher | Πανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών / University of Cyprus, Faculty of Pure and Applied Sciences | |
dc.subject.lcsh | Intrusion detection systems (Computer security) | en |
dc.subject.lcsh | Computer networks -- Security measures | en |
dc.subject.lcsh | Sensor networks | en |
dc.subject.lcsh | Wireless sensor networks | en |
dc.subject.lcsh | Internet of things | en |
dc.subject.lcsh | Anomaly detection (Computer security) | en |
dc.subject.lcsh | Routing (Computer network management) | en |
dc.subject.lcsh | Logistic regression analysis | en |
dc.title | Mids : a lightweight intrusion detection system for wireless sensor networks and the internet of things | en |
dc.title.alternative | MIDS: ένα ελαφρύ σύστημα ανίχνευσης παρεισδύσεων σε ασύρματα δίκτυα αισθητήρων και δίκτυα των πραγμάτων | el |
dc.type | info:eu-repo/semantics/doctoralThesis | en |
dc.contributor.committeemember | Πιτσιλλίδης, Ανδρέας | el |
dc.contributor.committeemember | Γεωργίου, Χρύσης | el |
dc.contributor.committeemember | Μαρκάτος, Ευάγγελος | el |
dc.contributor.committeemember | Pitsillides, Andreas | en |
dc.contributor.committeemember | Georgiou, Chryssis | en |
dc.contributor.committeemember | Markatos, Evangelos | en |
dc.contributor.committeemember | Monteiro, Edmundo | en |
dc.contributor.department | Πανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών, Τμήμα Πληροφορικής | el |
dc.contributor.department | University of Cyprus, Faculty of Pure and Applied Sciences, Department of Computer Science | en |
dc.subject.uncontrolledterm | ΣΥΣΤΗΜΑΤΑ ΑΝΙΧΝΕΥΣΗΣ ΠΑΡΕΙΣΔΥΣΕΩΝ ΔΙΚΤΥΟΥ | el |
dc.subject.uncontrolledterm | ΑΣΥΡΜΑΤΑ ΔΙΚΤΥΑ ΑΙΣΘΗΤΗΡΩΝ | el |
dc.subject.uncontrolledterm | ΔΙΑΔΙΚΤΥΟ ΤΩΝ ΠΡΑΓΜΑΤΩΝ | el |
dc.subject.uncontrolledterm | ΑΝΙΧΝΕΥΣΗ ΑΝΩΜΑΛΙΩΝ | el |
dc.subject.uncontrolledterm | ΕΠΙΘΕΣΕΙΣ ΣΤΟ ΕΠΙΠΕΔΟ ΔΡΟΜΟΛΟΓΗΣΗΣ | el |
dc.subject.uncontrolledterm | ΔΥΑΔΙΚΗ ΛΟΓΙΣΤΙΚΗ ΠΑΛΙΝΔΡΟΜΗΣΗ | el |
dc.subject.uncontrolledterm | ΕΡΓΑΛΕΙΟ ΠΑΡΑΚΟΛΟΥΘΗΣΗΣ ΑΙΣΘΗΤΗΡΩΝ | el |
dc.subject.uncontrolledterm | INTRUSION DETECTION SYSTEMS | en |
dc.subject.uncontrolledterm | WIRELESS SENSOR NETWORKS | en |
dc.subject.uncontrolledterm | INTERNET OF THINGS | en |
dc.subject.uncontrolledterm | ANOMALY DETECTION | en |
dc.subject.uncontrolledterm | ROUTING LAYER ATTACKS | en |
dc.subject.uncontrolledterm | BINARY LOGISTIC REGRESSION | en |
dc.subject.uncontrolledterm | SENSOR MONITORING TOOL | en |
dc.identifier.lc | TK7872.D48I63 2017 | en |
dc.author.faculty | Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences | |
dc.author.department | Τμήμα Πληροφορικής / Department of Computer Science | |
dc.type.uhtype | Doctoral Thesis | en |
dc.rights.embargodate | 2020-02-15 | |
dc.contributor.orcid | Vassiliou, Vasos [0000-0001-8647-0860] | |