Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Methodology for Wireless Intrusion Detection System

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 6
Year of Publication: 2014
Authors:
Tanvir Habib Sardar
Zahid Ansari
Amjad Khan

Tanvir Habib Sardar, Zahid Ansari and Amjad Khan. Article: A Methodology for Wireless Intrusion Detection System. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(6):12-15, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Tanvir Habib Sardar and Zahid Ansari and Amjad Khan},
	title = {Article: A Methodology for Wireless Intrusion Detection System},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {6},
	pages = {12-15},
	month = {October},
	note = {Full text available}
}

Abstract

While wireless networks are mounting in reputation and attractiveness, managing these networks for mistreatment and intrusions is not that available. Even though some Intrusion Prevention Systems have come in existence on the market, their effectiveness in intrusion detection are partial. Authentic intrusion detection in wireless networks is not a straightforward add on. This paper discusses a methodology for intrusion detection in wireless network using a cumulative sum algorithm.

References

  • I. F. Akyildiz, W. Su,Y. Sankarasubramaniam and E. Cayirci:Wireless sensor networks: A survey, Computer Networks, 38(4):393--422, March 2002.
  • Anthony D. Wood and John A. Stankovic: Denial of service in sensor networks,IEEE computer,October 2002,pp 61-62.
  • C. Karlof and D. Wagner: Secure Routing in Wireless sensor networks:Attacks and Countermeasures, Ad Hoc Networks, vol. 1, pp. 293-315, 2003 .
  • Yi-an Huang , Wei Fan , Wenke Lee , Philip S. Yu: Cross feature analysis for -Detecting Ad-Hoc Routing Anomalies, Proceedings of the 23rd International Conference on Distributed Computing Systems, p. 478, May 19-22, 2003.
  • K. Ilgun, R. A. Kemmerer, and P. Porras State transition analysis A Rule Based intrusion detection approach, IEEE Trans on Software Engineering, 21 (1995), pp. 181–199.
  • Jake Ryan,Meng-Jang Lin,Risto Intrusion detection with Neural Networks, Advances in Neural Information Processing Systems 10 (Proceedings of NIPS'97, Denver, CO), MIT Press, 1998.
  • P. A. Porras and P. G. Neumann: Emerald: Event monitoring anomalous live disturbances, in Proc of 20th NIST-NCSC Nat?l Info Systems Security Conf, 1997, pp. 353–365.
  • M. -Y. Huang, R. J. Jasper, A large scale distributed intrusion detection framework based on attack strategy analysis, Computer Networks, 31 (1999), pp. 2465–2475.
  • Y. Hu, A. Perrig, and D. Johnson: Packet leashes a defense against wormhole attack in wireless ad hoc networks. In Proceedings of the IEEE Conference on Computer Communications (Infocom), 2003.
  • Levente Buttyán, László Dóra, István Vajda: Statistical Wormhole Detection in sensor networks:ESAS 2005:128-141.
  • V. A. Siris, F. Ppapagalou: Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, Global Telecommunications IEEE 2004.
  • Haining Wang, Danlu Zhang, and Kang G Detecting SYN-Flooding Attacks, IEEE INFOCOM'2002, New York City, NY, 2002.
  • M. Basseville and I. V Nikiforov Detection of abrupt changes Theory and Application, Prentice Hall, 1993.
  • B. E. Brodsky and B. S. Darkhovsky A non parametric methods in change point Problems, Kluwer Academic Publishers, 1993.
  • Riaz A. Shaikh, S. M. H. Zaidi, Saeed Rajput and Kashif Shar Review over anomaly detection algorithms for detecting SYN-Flooding attacks 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan.