International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 59    Submit Your Rating     Cite This   Download        Certificate

A COMPARATIVE ANALYSIS AND IMPLEMENTATION OF INTRUSION DETECTION TECHNIQUES FOR WIRELESS NETWORKS

    2 Author(s):  KAPIL SIROHI , SUSHMA

Vol -  7, Issue- 2 ,         Page(s) : 25 - 30  (2016 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Intrusion detection is a significant area of research in the security of wireless networks. There are many techniques for intrusion detection in wired system; however applying them directly into wireless environment is not possible. In this research work, we will see and compare various well known intrusion detection system for wireless networks with their problems and solutions. In this research work, proposed intrusion recognition system specially designed for wireless network is discussed. This new scheme solves all the problems of existing intrusion detection systems such as detecting the malicious activities and the presence of false misbehavior report.

  1. Anderson, James P.  “Computer Security Threat Monitoring and Surveillance”, James P. Anderson Co., February 1980.
  2. Anderson, James P.  “A Unification of Computer and Network Security Concepts”, IEEE Proceedings of the 1985 Symposium on Security and Privacy, April 1985, pp. 77-87.
  3. Nessett, Dan M.  “Factors Affecting Distributed System Security.” IEEE Transactions on Software Engineering, SE-13(2), February 1987, pp. 233-248.
  4. Denning, Dorothy E.  “An Intrusion Detection Model”, IEEE Trans. on Software Engineering, SE-13(2), February 1987, pp. 222-232.
  5. Lu, Wen-Pai, and Malur K. Sundareshan, “A Model for Multilevel Security in Computer Networks”, IEEE Trans. on Software Engineering, 16(6).  June 1990, pp. 647-659.
  6. Jones, Anita, and Robert Sielken.  “Intrusion Detection” University of Virginia Technical Report, May 1999.
  7. Cannady, J. and J. Harrell.  “A Comparative Analysis of Current Intrusion Detection Technologies”, 4th Technology for Information Security Conference, May 1996.
  8. Lunt, T.F.  “A Survey of Intrusion Detection Techniques”, Computer & Security 12, 1993, pp. 405-418.
  9. Sundaram, Aurobindo, “An Introduction to Intrusion Detection”, ACM Crossroads, vol. 2, no. 4, 1996.
  10. Anderson, Debra, Than Frivold, and Alfonso Valdes.  “Next Generation Intrusion Detection Expert System (NIDES): A Summary.”  SRI International, May 1995.
  11. “What is NIDES?”  SRI International / Computer Science Laboratory, Http://www.csl.sri.com/nides/index1.html.
  12. Ilgun, Koral, Richard A. Kemmerer and Phillip A. Porras, “State Transition Analysis: A Rule-Based Intrusion Detection Approach“, IEEE Transitions on Software Engineering, 21(3). March 1995. 181-199
  13. K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Trans Mobile Computer., vol.6, no.5, pp.536-550, May 2007
  14. T. Sheltami et al. “AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node detection Enhancement, “in Proc. 24th IEEE International Conference on Advanced Information Networking and Applications, 2010,pp 634-640
  15. N. Nasser and Y. Chen ” Enhanced Intrusion detection system for discovering malicious nodes in mobile ad hoc network”, in Proc. IEEE Int. Conf. Commun. , Glasgow, Scotland, Jun. 24-28, 2007, pp.1154-1159
  16. S. Marti, T .J. Giuli, K. Lai, and M. Baker, ”Mitigating routing misbehavior in mobile ad hoc networks”, in Proc. 6Th Annual  Int. Conf. Mobile Computer. Network, Boston, MA, 2000, pp. 255-265.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details