CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Intrusion Detection System using Bayesian Approach for Wireless Network

by Manoj Sharma, Keshav Jindal, Ashish Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 5
Year of Publication: 2012
Authors: Manoj Sharma, Keshav Jindal, Ashish Kumar
10.5120/7346-0197

Manoj Sharma, Keshav Jindal, Ashish Kumar . Intrusion Detection System using Bayesian Approach for Wireless Network. International Journal of Computer Applications. 48, 5 ( June 2012), 29-33. DOI=10.5120/7346-0197

@article{ 10.5120/7346-0197,
author = { Manoj Sharma, Keshav Jindal, Ashish Kumar },
title = { Intrusion Detection System using Bayesian Approach for Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 5 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number5/7346-0197/ },
doi = { 10.5120/7346-0197 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:43:19.641810+05:30
%A Manoj Sharma
%A Keshav Jindal
%A Ashish Kumar
%T Intrusion Detection System using Bayesian Approach for Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 5
%P 29-33
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An Intrusion Detection System (IDS) is a software or hardware tool used to detect unauthorized access of a computer system or network. A wireless IDS performs this task exclusively for the wireless network. These systems monitor traffic on your network looking for and logging threats and alerting personnel to respond. An IDS usually performs this task in two ways, with either signature-based or anomaly based detection. Almost every IDS today is at least in part signature-based. This means that known attacks can be detected by looking for these signatures. The other approach is anomaly-based systems. These are not often implemented, mostly because of the high amount of false alarms. It detects traffic which deviates from what it considers normal an alert is generated. The traditional IDS system is not work well for wireless network, but the wireless network is more vulnerable than a wired network. A major problem with current IDS that employs Bayesian network is they give a series of false alarms in system environment modification. There are two types of false alarms in determining the any deviations from normal pattern: false positive and false negative. The main goal is to keep these alarms as low as possible. So a BN is used to build automatic intrusion detection system based on signature recognition. The goal is to recognize signatures of known attacks, match the observed behavior with those known signatures, and signal intrusion when there is a match. IDS must be able to adapt to these changes. The goal is to provide a framework for an adaptive intrusion detection system that uses Bayesian network

References
  1. W Arbaugh. , N. Shankar, Wan Y. C. J. , "Your 802. 11 Wireless Network Has No Clothes", University of Maryland, Mar. 2001.
  2. R. Kumar, Isukapalli, V. Karunya, V. Raju, "Security in Mobile Computing Systems. " INTRUSION DETECTION IN WIRELESS NETWORKS.
  3. J. Krister and L. Stephen. "Network Security: Bayesian Network. "
  4. T. F. Lunt, R. Jagannathan, "IDES: The Enhanced Prototype C a Realtime Intrusion-Detection Expert System". Technical Report SRI-CSL-88-12, SRI International, Menlo Park, CA, 1988. Intrusion Detection (BNIDS) May. 2003.
  5. M. Esposito, C. Mazzariello, "Evaluating Pattern Recognition Techniques in Intrusion Detection Systems". The 7th International Workshop on Pattern Recognition in Information Systems, pp. 144-153, 2005.
  6. R. Goldman, "A Stochastic Model for Intrusions. " In Symposium on Recent Advances in Intrusion Detection (RAID), 2002.
  7. D. M. Chickering, "Learning Equivalence Classes of Bayesian Network Structure", Proceedings of the Twelfth Annual Conference on Uncertainty in Artificial Intelligence, Morgan Kaufmann, Reed College, Portland, Oregon, USA, pp. 150-157, 1996.
  8. G. F. Cooper, "An overview of the representation and discovery of causal relationships using Bayesian networks", AAAI Press and MIT Press, pp. 3-62, 1999.
  9. J. Pearl, "Probabilistic Reasoning in Intelligent Systems: Network of Plausible Inference". Morgan Kaufmann, 1997.
  10. P. Spirtes, C. Glymour, R. Scheines, "Causation, Prediction and Search (Second Edition)", MIT Press, Cambridge, MA, USA, 2000.
  11. N. Friedman, D. Koller, "Being Bayesian About Network Structure: A Bayesian Approach to Structure Discovery in Bayesian Networks", Machine Learning 50 (1-2), pp. 95-125, 2000.
  12. F . Jemili, M. Zagdoud, "A Framework for an Adaptive Intrusion Detection System using Bayesian Network" Monuba University Tunisia, 2010
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Bayesian Network Directed Acyclic Graph K2