Show simple item record

dc.contributor.advisorVassiliou, Vasosen
dc.contributor.authorIoannou, Christiana A.en
dc.coverage.spatialΚύπροςel
dc.coverage.spatialCyprusen
dc.creatorIoannou, Christiana A.en
dc.date.accessioned2017-03-27T05:30:08Z
dc.date.accessioned2017-08-03T10:45:18Z
dc.date.available2017-03-27T05:30:08Z
dc.date.available2017-08-03T10:45:18Z
dc.date.issued2017-02
dc.date.submitted2017-02-15
dc.identifier.urihttps://gnosis.library.ucy.ac.cy/handle/7/39544en
dc.descriptionIncludes bibliography (p. 155-165).en
dc.descriptionNumber of sources in the bibliography: 114en
dc.descriptionThesis (Ph. D.) -- University of Cyprus, Faculty of Pure and Applied Sciences, Department of Computer Science, 2017.en
dc.descriptionThe University of Cyprus Library holds the printed form of the thesis.en
dc.description.abstractΗ ομαδοποίηση (clustering) αποσκοπεί στη διαίρεση των αντικειμένων σε ομάδες βάση διαφόρων κριτηρίων. Σε πραγματικά δίκτυα πληροφοριών, κάθε χαρακτηριστικό των αντικειμένων, π.χ. ιδιότητες και τύποι συνδέσεων, περιέχει διαφορετική πληροφορία, και ορισμένα από αυτά τα χαρακτηριστικά μπορεί να μην είναι χρήσιμα στην διαδικασία ομαδοποίησης. Επομένως, πρέπει να προσδιορίσουμε πόσο σημαντική είναι η κάθε ιδιότητας και ο κάθε τύπος ακμής. Όταν η διαδικασία ομαδοποίησης λαμβάνει υπόψη το πόσο σημαντικά είναι τα χαρακτηριστικά των αντικειμένων επιτυγχάνει αποτελέσματα υψηλής ποιότητας.el
dc.description.abstractWireless sensor networks are used for critical applications due to their ability to provide low-cost, low-power, and diversified monitoring services. They also attract people with malicious intent who aim in disrupting the network by any means possible. Existing security methods fail in identifying unknown malicious attacks and require memory and power which are limited resources for WSNs. Intrusion Detection Systems (IDS) are found at the second line of security defense. They are engaged once the intruder has penetrated the first line of defense, the preventive layer. Most intrusion detection solutions for WSNs in the literature, are evaluated using simulation tools or mathematical models. We propose and evaluate mIDS; a run-time, low-memory overhead IDS that can detect unknown attacks by imposing minimum computation power. We implemented a monitoring tool in Contiki O/S, called RMT, that monitors and collects data from multiple network layers, in real time. RMT gathers statistics from the various sensor node's layers that can be customized to decrease memory cost. RMT provides monitoring information to an anomaly IDS, called mIDS, that detects attacks within the network. At an offline stage the data gathered from the RMT monitoring is analysed using the profiling statistical Binary Logistic Regression (BLR) to define normal sensor activity. To have a fine grain detection model both benign and viral behaviors are included to form the plane of what is normal behavior. We implemented routing WSN attacks that take advantage of the routing layer vulnerabilities to infect the sensor node. At run time, mIDS uses input data from RMT and the normal activity profile to detect abnormalities within the network. At prede_ned intervals mIDS analyses sensor node activity using the probability equation extracted at the offline stage using BLR. mIDS is currently installed at the constrained nodes and it is responsible for monitoring local sensor behavior. We developed BLR models for the routing and the MAC network layers to detect routing attacks. The BLR models that achieved 96% - 100% accuracy levels were the ones trained with routing layer data. We developed BLR models for each attack implemented and evaluated real time in three different topologies. Depending which BLR model raised an alarm, we can classify the type of the attack if it has Selective Forward and/or Blackhole or if the attack is of type Sinkhole. The BLR model for Sinkhole attack detected, in all network topologies the attack with no false alarms.en
dc.format.extent176 p. : ill. (some col.), diagrs., tables ; 30 cm.en
dc.language.isoengen
dc.publisherΠανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών / University of Cyprus, Faculty of Pure and Applied Sciences
dc.subject.lcshIntrusion detection systems (Computer security)en
dc.subject.lcshComputer networks -- Security measuresen
dc.subject.lcshSensor networksen
dc.subject.lcshWireless sensor networksen
dc.subject.lcshInternet of thingsen
dc.subject.lcshAnomaly detection (Computer security)en
dc.subject.lcshRouting (Computer network management)en
dc.subject.lcshLogistic regression analysisen
dc.titleMids : a lightweight intrusion detection system for wireless sensor networks and the internet of thingsen
dc.title.alternativeMIDS: ένα ελαφρύ σύστημα ανίχνευσης παρεισδύσεων σε ασύρματα δίκτυα αισθητήρων και δίκτυα των πραγμάτωνel
dc.typeinfo:eu-repo/semantics/doctoralThesisen
dc.contributor.committeememberΠιτσιλλίδης, Ανδρέαςel
dc.contributor.committeememberΓεωργίου, Χρύσηςel
dc.contributor.committeememberΜαρκάτος, Ευάγγελοςel
dc.contributor.committeememberPitsillides, Andreasen
dc.contributor.committeememberGeorgiou, Chryssisen
dc.contributor.committeememberMarkatos, Evangelosen
dc.contributor.committeememberMonteiro, Edmundoen
dc.contributor.departmentΠανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών, Τμήμα Πληροφορικήςel
dc.contributor.departmentUniversity of Cyprus, Faculty of Pure and Applied Sciences, Department of Computer Scienceen
dc.subject.uncontrolledtermΣΥΣΤΗΜΑΤΑ ΑΝΙΧΝΕΥΣΗΣ ΠΑΡΕΙΣΔΥΣΕΩΝ ΔΙΚΤΥΟΥel
dc.subject.uncontrolledtermΑΣΥΡΜΑΤΑ ΔΙΚΤΥΑ ΑΙΣΘΗΤΗΡΩΝel
dc.subject.uncontrolledtermΔΙΑΔΙΚΤΥΟ ΤΩΝ ΠΡΑΓΜΑΤΩΝel
dc.subject.uncontrolledtermΑΝΙΧΝΕΥΣΗ ΑΝΩΜΑΛΙΩΝel
dc.subject.uncontrolledtermΕΠΙΘΕΣΕΙΣ ΣΤΟ ΕΠΙΠΕΔΟ ΔΡΟΜΟΛΟΓΗΣΗΣel
dc.subject.uncontrolledtermΔΥΑΔΙΚΗ ΛΟΓΙΣΤΙΚΗ ΠΑΛΙΝΔΡΟΜΗΣΗel
dc.subject.uncontrolledtermΕΡΓΑΛΕΙΟ ΠΑΡΑΚΟΛΟΥΘΗΣΗΣ ΑΙΣΘΗΤΗΡΩΝel
dc.subject.uncontrolledtermINTRUSION DETECTION SYSTEMSen
dc.subject.uncontrolledtermWIRELESS SENSOR NETWORKSen
dc.subject.uncontrolledtermINTERNET OF THINGSen
dc.subject.uncontrolledtermANOMALY DETECTIONen
dc.subject.uncontrolledtermROUTING LAYER ATTACKSen
dc.subject.uncontrolledtermBINARY LOGISTIC REGRESSIONen
dc.subject.uncontrolledtermSENSOR MONITORING TOOLen
dc.identifier.lcTK7872.D48I63 2017en
dc.author.facultyΣχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeDoctoral Thesisen
dc.rights.embargodate2020-02-15
dc.contributor.orcidVassiliou, Vasos [0000-0001-8647-0860]


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record