An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme...
| Main Authors: | Hussain, Muhammad Zunnurain, Mohd Hanapi, Zurina, Abdullah, Azizol, Hussin, Masnida, Ninggal, Mohd Izuan Hafez |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
PeerJ
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/114891/ http://psasir.upm.edu.my/id/eprint/114891/1/114891.pdf |
Similar Items
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015)
by: Alsaedi, Noor, et al.
Published: (2015)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
by: Mohd Hanapi, Zurina, et al.
Published: (2014)
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017)
by: Alsaedi, Noor, et al.
Published: (2017)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Detection and mitigation of ARP storm attacks using software defined networks
by: Numan, Munther, et al.
Published: (2017)
by: Numan, Munther, et al.
Published: (2017)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Detecting and mitigating botnet attacks using deep
learning in software-defined networks
by: Muhammad Waqas, Nadeem
Published: (2023)
by: Muhammad Waqas, Nadeem
Published: (2023)
Efficient secure routing mechanisms for the low-powered IoT network: a literature review
by: Hussain, Muhammad Zunnurain, et al.
Published: (2023)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2023)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
Performance evaluation of time-based black hole attack detection in mobile ad hoc networks
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2014)
Enhancing IoT Resilience: Machine Learning Techniques for Autonomous Anomaly Detection and Threat Mitigation
by: Lokuliyana, Shashika, et al.
Published: (2025)
by: Lokuliyana, Shashika, et al.
Published: (2025)
Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Wireless sensor security issues on data link layer: a survey
by: Zulkifl Hasan, Muhammad, et al.
Published: (2023)
by: Zulkifl Hasan, Muhammad, et al.
Published: (2023)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
An efficient approach to detecting missing tags in RFID data stream
by: Zainudin, Nur’Aifaa, et al.
Published: (2018)
by: Zainudin, Nur’Aifaa, et al.
Published: (2018)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Mitigating sulphate attacks in geotechnical engineering
by: Chegenizadeh, Amin, et al.
Published: (2017)
by: Chegenizadeh, Amin, et al.
Published: (2017)
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
by: Ibrahim, Mohammed, et al.
Published: (2021)
by: Ibrahim, Mohammed, et al.
Published: (2021)
A review on wormhole attacks in MANET
by: Enshaei, Mehdi, et al.
Published: (2015)
by: Enshaei, Mehdi, et al.
Published: (2015)
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016)
by: Ahmed, Dana Hasan, et al.
Published: (2016)
Compare and Measure Selfishness Detection (CMSD) mechanism: promptness and accuracy
by: Samian, Normalia, et al.
Published: (2015)
by: Samian, Normalia, et al.
Published: (2015)
Convolutional long short-term memory for fileless malware detection
by: Kareegalan, Kunaprasan, et al.
Published: (2025)
by: Kareegalan, Kunaprasan, et al.
Published: (2025)
Role performance trust-based access control for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2016)
by: Salji, Mohd Rafiz, et al.
Published: (2016)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
by: Abdul Aziz, Maslina, et al.
Published: (2019)
by: Abdul Aziz, Maslina, et al.
Published: (2019)
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
LI-AODV: lifetime improving AODV routing for detecting and removing black-hole attack from VANET
by: ABDULKADER, ZAID A., et al.
Published: (2017)
by: ABDULKADER, ZAID A., et al.
Published: (2017)
Similar Items
-
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015) -
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016) -
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol
by: Mohd Hanapi, Zurina, et al.
Published: (2014) -
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017) -
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)