A COMPARATIVE ANALYSIS AND IMPLEMENTATION OF INTRUSION DETECTION TECHNIQUES FOR WIRELESS NETWORKS
2
Author(s):
KAPIL SIROHI , SUSHMA
Vol - 7, Issue- 2 ,
Page(s) : 25 - 30
(2016 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
Intrusion detection is a significant area of research in the security of wireless networks. There are many techniques for intrusion detection in wired system; however applying them directly into wireless environment is not possible. In this research work, we will see and compare various well known intrusion detection system for wireless networks with their problems and solutions. In this research work, proposed intrusion recognition system specially designed for wireless network is discussed. This new scheme solves all the problems of existing intrusion detection systems such as detecting the malicious activities and the presence of false misbehavior report.
- Anderson, James P. “Computer Security Threat Monitoring and Surveillance”, James P. Anderson Co., February 1980.
- Anderson, James P. “A Unification of Computer and Network Security Concepts”, IEEE Proceedings of the 1985 Symposium on Security and Privacy, April 1985, pp. 77-87.
- Nessett, Dan M. “Factors Affecting Distributed System Security.” IEEE Transactions on Software Engineering, SE-13(2), February 1987, pp. 233-248.
- Denning, Dorothy E. “An Intrusion Detection Model”, IEEE Trans. on Software Engineering, SE-13(2), February 1987, pp. 222-232.
- Lu, Wen-Pai, and Malur K. Sundareshan, “A Model for Multilevel Security in Computer Networks”, IEEE Trans. on Software Engineering, 16(6). June 1990, pp. 647-659.
- Jones, Anita, and Robert Sielken. “Intrusion Detection” University of Virginia Technical Report, May 1999.
- Cannady, J. and J. Harrell. “A Comparative Analysis of Current Intrusion Detection Technologies”, 4th Technology for Information Security Conference, May 1996.
- Lunt, T.F. “A Survey of Intrusion Detection Techniques”, Computer & Security 12, 1993, pp. 405-418.
- Sundaram, Aurobindo, “An Introduction to Intrusion Detection”, ACM Crossroads, vol. 2, no. 4, 1996.
- Anderson, Debra, Than Frivold, and Alfonso Valdes. “Next Generation Intrusion Detection Expert System (NIDES): A Summary.” SRI International, May 1995.
- “What is NIDES?” SRI International / Computer Science Laboratory, Http://www.csl.sri.com/nides/index1.html.
- Ilgun, Koral, Richard A. Kemmerer and Phillip A. Porras, “State Transition Analysis: A Rule-Based Intrusion Detection Approach“, IEEE Transitions on Software Engineering, 21(3). March 1995. 181-199
- K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, “An acknowledgment-based approach for the detection of routing misbehavior in MANETs,” IEEE Trans Mobile Computer., vol.6, no.5, pp.536-550, May 2007
- T. Sheltami et al. “AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node detection Enhancement, “in Proc. 24th IEEE International Conference on Advanced Information Networking and Applications, 2010,pp 634-640
- N. Nasser and Y. Chen ” Enhanced Intrusion detection system for discovering malicious nodes in mobile ad hoc network”, in Proc. IEEE Int. Conf. Commun. , Glasgow, Scotland, Jun. 24-28, 2007, pp.1154-1159
- S. Marti, T .J. Giuli, K. Lai, and M. Baker, ”Mitigating routing misbehavior in mobile ad hoc networks”, in Proc. 6Th Annual Int. Conf. Mobile Computer. Network, Boston, MA, 2000, pp. 255-265.
|