CFP last date
20 December 2024
Reseach Article

A Methodology for Wireless Intrusion Detection System

Published on July 2014 by Tanvir Habib Sardar, Zahid Ansari, Amjad Khan
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 6
July 2014
Authors: Tanvir Habib Sardar, Zahid Ansari, Amjad Khan
315e6fe2-e372-4c53-b579-93cffffe0c0d

Tanvir Habib Sardar, Zahid Ansari, Amjad Khan . A Methodology for Wireless Intrusion Detection System. International Conference on Information and Communication Technologies. ICICT, 6 (July 2014), 12-15.

@article{
author = { Tanvir Habib Sardar, Zahid Ansari, Amjad Khan },
title = { A Methodology for Wireless Intrusion Detection System },
journal = { International Conference on Information and Communication Technologies },
issue_date = { July 2014 },
volume = { ICICT },
number = { 6 },
month = { July },
year = { 2014 },
issn = 0975-8887,
pages = { 12-15 },
numpages = 4,
url = { /proceedings/icict/number6/18005-1462/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Tanvir Habib Sardar
%A Zahid Ansari
%A Amjad Khan
%T A Methodology for Wireless Intrusion Detection System
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 6
%P 12-15
%D 2014
%I International Journal of Computer Applications
Abstract

While wireless networks are mounting in reputation and attractiveness, managing these networks for mistreatment and intrusions is not that available. Even though some Intrusion Prevention Systems have come in existence on the market, their effectiveness in intrusion detection are partial. Authentic intrusion detection in wireless networks is not a straightforward add on. This paper discusses a methodology for intrusion detection in wireless network using a cumulative sum algorithm.

References
  1. I. F. Akyildiz, W. Su,Y. Sankarasubramaniam and E. Cayirci:Wireless sensor networks: A survey, Computer Networks, 38(4):393--422, March 2002.
  2. Anthony D. Wood and John A. Stankovic: Denial of service in sensor networks,IEEE computer,October 2002,pp 61-62.
  3. C. Karlof and D. Wagner: Secure Routing in Wireless sensor networks:Attacks and Countermeasures, Ad Hoc Networks, vol. 1, pp. 293-315, 2003 .
  4. Yi-an Huang , Wei Fan , Wenke Lee , Philip S. Yu: Cross feature analysis for -Detecting Ad-Hoc Routing Anomalies, Proceedings of the 23rd International Conference on Distributed Computing Systems, p. 478, May 19-22, 2003.
  5. K. Ilgun, R. A. Kemmerer, and P. Porras State transition analysis A Rule Based intrusion detection approach, IEEE Trans on Software Engineering, 21 (1995), pp. 181–199.
  6. Jake Ryan,Meng-Jang Lin,Risto Intrusion detection with Neural Networks, Advances in Neural Information Processing Systems 10 (Proceedings of NIPS'97, Denver, CO), MIT Press, 1998.
  7. P. A. Porras and P. G. Neumann: Emerald: Event monitoring anomalous live disturbances, in Proc of 20th NIST-NCSC Nat?l Info Systems Security Conf, 1997, pp. 353–365.
  8. M. -Y. Huang, R. J. Jasper, A large scale distributed intrusion detection framework based on attack strategy analysis, Computer Networks, 31 (1999), pp. 2465–2475.
  9. Y. Hu, A. Perrig, and D. Johnson: Packet leashes a defense against wormhole attack in wireless ad hoc networks. In Proceedings of the IEEE Conference on Computer Communications (Infocom), 2003.
  10. Levente Buttyán, László Dóra, István Vajda: Statistical Wormhole Detection in sensor networks:ESAS 2005:128-141.
  11. V. A. Siris, F. Ppapagalou: Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, Global Telecommunications IEEE 2004.
  12. Haining Wang, Danlu Zhang, and Kang G Detecting SYN-Flooding Attacks, IEEE INFOCOM'2002, New York City, NY, 2002.
  13. M. Basseville and I. V Nikiforov Detection of abrupt changes Theory and Application, Prentice Hall, 1993.
  14. B. E. Brodsky and B. S. Darkhovsky A non parametric methods in change point Problems, Kluwer Academic Publishers, 1993.
  15. Riaz A. Shaikh, S. M. H. Zaidi, Saeed Rajput and Kashif Shar Review over anomaly detection algorithms for detecting SYN-Flooding attacks 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection System Wireless Ids Cumulative Sum Algorithm