CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Survey on Intrusion Detection System for Wireless Network

by Ajita Mishra, Ashish Kumar Srivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 21
Year of Publication: 2013
Authors: Ajita Mishra, Ashish Kumar Srivastava
10.5120/13021-0221

Ajita Mishra, Ashish Kumar Srivastava . A Survey on Intrusion Detection System for Wireless Network. International Journal of Computer Applications. 73, 21 ( July 2013), 37-40. DOI=10.5120/13021-0221

@article{ 10.5120/13021-0221,
author = { Ajita Mishra, Ashish Kumar Srivastava },
title = { A Survey on Intrusion Detection System for Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 21 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number21/13021-0221/ },
doi = { 10.5120/13021-0221 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:46.375762+05:30
%A Ajita Mishra
%A Ashish Kumar Srivastava
%T A Survey on Intrusion Detection System for Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 21
%P 37-40
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of Wireless network becomes associate in nursing woeful necessary issues with the speedy development of wireless network that is in danger for an honest vary of attacks due to preparation among the hostile atmosphere and having limited resources. Now a day wireless detection network is a unit which is loosely utilized in environmental management, police investigation tasks, monitoring military applications, health connected applications, pursuit and dominant etc. A wireless intrusion detection also aids among the detection of a variety of attacks. Wireless intrusion detection system cannot exclusively notice scoundrel WAPS, establish non-encrypted 802. 11 traffic, and facilitate isolate associate attacker's physical location. We have a tendency to define the basics of intrusion detection in wireless network, describing the varieties of attacks and state the motivation for intrusion detection in wireless network. This paper, firstly indicates the developing history of WIDS, and then summarizes the related work on Wireless Intrusion Prevention System through RF jamming technique.

References
  1. Y. Zhang, G. Chen, W. Weng, and Z. Wang, "An Overview of Wireless Intrusion Prevention Systems,"IEEE ICCSNA , vol. 3, no. 12, pp. 147–150, 2010.
  2. T. Badal, D. Verma, "A Modular Approach for Intrusion Detection System in Wireless Networks", IJACNS, vol. 1, pp. 57-61, 2011, ISSN:2250-3757.
  3. K. Suresh, A. Sarala Devi, and Jammi Ashok, "A Novel Approach Based Wireless Intrusion Detection System", IJCSIT, Vol. 3 (4) , 2012,4666 – 4669, ISSN:0975-9646.
  4. Heady, R. , "The Architecture of a Network-level Intrusion Detection System. "1st Edn. , Department of Computer Science, Mexico, pp: 18, 1990.
  5. Zamboni, D. , 2001. Using internal sensors for computer intrusion detection. Purdue University.
  6. Debar, H. M. Dacier and A. Wespi, 1999. Towards at taxonomy of intrusion-detection systems. Comput. Netw. , 31: 805-822.
  7. S. Zhong, T. M. Khoshgoftaar and S. V. Nath, "A Clustering Approach to Wireless Network Intrusion Detection", in proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAL'O5), PP. 54-60, 2005.
  8. V. Gupta and S. Gupta, "Experiments in Wireless Internet Security", Wireless Communications and Networking Conference, (WCNC 2002), IEEE Volume 2, pp. 860-864, 2002.
  9. Z. Li, A. Das and J. Zhou, "Theoretical basis for intrusion detection," Information Assurance Workshop, (IAW 2005), proceedings from the sixth Annual IEEE SMC, pp. 184-192, 2005.
  10. Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava, "Intrusion Detection: A Survey", Managing Cyber Threats: Issues, Approaches and Challenges, Vol. 5, 2005, Springer Publisher.
  11. P. Brutch and C. Ko, "Challenges in intrusion detection in wireless ad-hoc networks," IEEE Proceedings of Workshop on Security and Assurance in Ad hoc Networks, 2003, pp368 - 373, Jan. 2003.
  12. Tsakountakis, G. Kambourakis, S. Gritzalis, "Towards effective Wireless Intrusion Detection in IEEE 802. 11i," in: Security, Privacy and Trust in Pervasive and Ubiquitous Computing, (SECPerU 2007), Third International Workshop, pp. 37-42, 2007.
  13. N. Ye, SM. Emran, Q. Chen and S. Vilbert,"Multivariate statistical analysis of audit trails for host-based intrusion detection", Computers, IEEE Transactions on Volume 51, Issue 7, pp. 810 – 820, July2002.
Index Terms

Computer Science
Information Sciences

Keywords

WNS IDS attacks SID WIPS