CFP last date
20 December 2024
Reseach Article

Intrusion Detection System using Node Analysis in Wireless Networks

by Sathiyaprabha R., T. Anusha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 33
Year of Publication: 2020
Authors: Sathiyaprabha R., T. Anusha
10.5120/ijca2020920402

Sathiyaprabha R., T. Anusha . Intrusion Detection System using Node Analysis in Wireless Networks. International Journal of Computer Applications. 176, 33 ( Jun 2020), 27-31. DOI=10.5120/ijca2020920402

@article{ 10.5120/ijca2020920402,
author = { Sathiyaprabha R., T. Anusha },
title = { Intrusion Detection System using Node Analysis in Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2020 },
volume = { 176 },
number = { 33 },
month = { Jun },
year = { 2020 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number33/31419-2020920402/ },
doi = { 10.5120/ijca2020920402 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:44:10.471258+05:30
%A Sathiyaprabha R.
%A T. Anusha
%T Intrusion Detection System using Node Analysis in Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 33
%P 27-31
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The threat of cyber intrusion is progressively high and harmful. Intrusion Detection Systems (IDS) provides the ability to identify security breaches in a system. A security breach will be taking any action based on the owner of the system believes unauthorized. Attacks in Wireless Networks (WNs) aim in limiting or even eliminating the ability of the network to perform its expected function. WNs are networks with limited resources and often deployed in uncontrollable environments that an intruder can easily access. WN attacks target specific network layer’s vulnerabilities but normally affect other layers as well. Network layer should be monitored and evaluated in order to detect possible malicious intervention. In this research, a general methodology of an anomaly-based Intrusion Detection System is proposed and evaluated the proposed system using routing layer attacks in Ad-hoc Distance Vector Routing (AODV) protocol and IDS is able to detect malicious activity and our solution delivered the packets to the receiver in a new route without discarding.

References
  1. C. Ioannou, V. Vassiliou and C. Sergiou, "An Intrusion Detection System for Wireless Sensor Networks," 2017 24th International Conference on Telecommunications (ICT), Limassol, 2017, pp. 1-5, doi: 10.1109/ICT.2017.7998271.
  2. S. M. Kasongo and Y. Sun, "A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System," in IEEE Access, vol. 7, pp. 38597-38607, 2019.
  3. Y. Xiao, C. Xing, T. Zhang and Z. Zhao, "An Intrusion Detection Model Based on Feature Reduction and Convolutional Neural Networks," in IEEE Access, vol. 7, pp. 42210-42219, 2019.
  4. Aman deep Kaur, Prakash Rao Ragiri, “Study of various Attacks and Impact of Gray hole attack over Ad- Hoc On demand (AODV) Routing Protocol in MANETS”, International Journal of Engineering Research & Technology (IJERT), IJERT ISSN: 2278-0181, IJERTV3IS050721, www.ijert.org, Vol. 3 Issue 5, May – 2014.
  5. W. Zhu, M. Deng and Q. Zhou, "An intrusion detection algorithm for wireless networks based on ASDL," in IEEE/CAA Journal of Automatica Sinica, vol. 5, no. 1, pp. 92-107, Jan. 2018.
  6. P. Tao, Z. Sun and Z. Sun, "An Improved Intrusion Detection Algorithm Based on GA and SVM," in IEEE Access, vol. 6, pp. 13624-13631, 2018.
  7. Yu, Dunyi,"Research on Anomaly Intrusion Detection Technology in Wireless Network," 2018 International Conference on Virtual Reality and Intelligent Systems (ICVRIS), Changsha, 2018, pp. 540-543.
  8. H. Alipour, Y. B. Al-Nashif, P. Satam and S. Hariri, "Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2158-2170, Oct. 2015.
  9. I. Onat and A. Miri, "An intrusion detection system for wireless sensor networks," WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005., Montreal, Que., 2005, pp.
  10. A. Yang, Y. Zhuansun, C. Liu, J. Li and C. Zhang, "Design of Intrusion Detection System for Internet of Things Based on Improved BP Neural Network," in IEEE Access, vol. 7, pp. 106043- 106052, 2019.
  11. H. Yang and F. Wang, "Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network," in IEEE Access, vol. 7, pp. 64366-64374, 2019.
  12. J. Abo Nada and M. Rasmi Al-Mosa, "A Proposed Wireless Intrusion Detection Prevention and Attack System," 2018 International Arab Conference on Information Technology (ACIT), Werdanye, Lebanon, 2018,pp.1-5.
  13. Rupali Sharma ,“Gray-hole Attack in Mobile Ad- hoc Networks : A Survey”, International Journal of Computer Science and Information Technologies, Vol. 7 (3), 2016.
  14. Marepalli Radha, M. Nagabhushana Rao, “Gray Hole Attack Detection Prevention and Elimination using Sdpegh in Manet”, International Journal of Engineering and Advanced Technology(IJEAT), ISSN: 2249 – 8958, Volume-8 Issue-3, February 2019.
  15. Anubha Goyal, “Selective Packet Drop Attack in MANET-A Review”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.5, May- 2014.
  16. P. Tao, Z. Sun and Z. Sun, "An Improved Intrusion Detection Algorithm Based on GA and SVM," in IEEE Access, vol. 6, pp. 13624-13631, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

WN IDS AODV.