Open Access   Article Go Back

A Taxonomy of Network Intrusion Detection System for Wireless Communication

R. Karthik1 , B.L. Shivakumar2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-12 , Page no. 35-42, Dec-2015

Online published on Dec 31, 2015

Copyright © R. Karthik , B.L. Shivakumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Karthik , B.L. Shivakumar, “A Taxonomy of Network Intrusion Detection System for Wireless Communication,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.35-42, 2015.

MLA Style Citation: R. Karthik , B.L. Shivakumar "A Taxonomy of Network Intrusion Detection System for Wireless Communication." International Journal of Computer Sciences and Engineering 3.12 (2015): 35-42.

APA Style Citation: R. Karthik , B.L. Shivakumar, (2015). A Taxonomy of Network Intrusion Detection System for Wireless Communication. International Journal of Computer Sciences and Engineering, 3(12), 35-42.

BibTex Style Citation:
@article{Karthik_2015,
author = {R. Karthik , B.L. Shivakumar},
title = {A Taxonomy of Network Intrusion Detection System for Wireless Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2015},
volume = {3},
Issue = {12},
month = {12},
year = {2015},
issn = {2347-2693},
pages = {35-42},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=737},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=737
TI - A Taxonomy of Network Intrusion Detection System for Wireless Communication
T2 - International Journal of Computer Sciences and Engineering
AU - R. Karthik , B.L. Shivakumar
PY - 2015
DA - 2015/12/31
PB - IJCSE, Indore, INDIA
SP - 35-42
IS - 12
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2642 2473 downloads 2375 downloads
  
  
           

Abstract

Now a days, it is essential to give a high-level security to protect highly sensitive and private information. Network Technology and Internet Application sector plays a vital role in today’s trend. Over a few years, we are able to see a tremendous growth towards the network technology. With the help of internet facility, we are able to carry out different tasks such as internet banking, online education, social networking and so on, which make our life more comfortable. Numbers of clients are being connected with the technology day by day. Despite being hacked by unwanted intruder or malicious. This cause a great damage to the documents, software and the confidential data’s. Terms such as worms, viruses and Trojans create fear in the internet clients. Because of security and safety against these acts, it can be done only with our system, which will be able to sense and reply these attack or penetration. A very helpful tool in this is Intrusion Detection System (IDS), which detects the attacks and analysis it to take appropriate decision against it. Intrusion Detection System has a great impact on cyber security and network vulnerability. Once the detection is marked, the corresponding action could be taken by IDS. Intrusion detection system is a software and hardware device. This paper will illustrate us an overview of IDS and to create a secure zone in the sector of networking. Furthermore, appropriate problems and challenges in this field are consequently illustrated and discussed.

Key-Words / Index Term

Security Signature, Intrusion detection, Network Attacks, Prevention System, Analyzer, DOS, Misuse detection, Anomaly detection

References

[1] R. Bace and P. Mell, “Special Publication on Intrusion DetectionSystems,”Tech.Report SP 800-31, National Institute of Standards and Technology, Gaithersburg, Md., Nov 201.
[2] David W. Cooke, Rapporteur, “The Resilience of the Electric Power Delivery System in Response to Terrorism and Natural Disasters” Summary of a workshop in National Research council. ISBN: 978-0-309-29395-2, Page No (1-42).
[3] Defeng Wang, Yeung, D.S., and Tsang, E.C., “Weighted
Mahalanobis Distance Kernels for Support Vector
Machines”, IEEE Transactions on Neural Networks,
Volume-18, No-5, Page No (1453-1462), Sep 207.
[4] Inella, Paul. “The Evolution of Intrusion Detection Systems.”[Online]Available http://www.securityfocus.com/infocus/1514, Nov 16, 201.
[5] Koral Ilgun, Richard A. Kemmerer, Fellow, IEEE, and Phillip A. Porras, “A State Transition Analysis: A Rule - Based Intrusion Detection Approach”, IEEE Transactions on Software Engineering, Volume-21, No-3, Page No (181 – 199), Mar 195.
[6] L Ertoz, E. Eilertson, A. Lazarevic, P. Tan, J. Srivastava, V. Kumar and P. Dokas, “The MINDS - Minnesota Intrusion Detection System, in Data Mining”, A. Joshi H. Kargupta, K. Sivakumar, Y. Yesha, “Next Generation Challenges and Future Directions”, Ed., 204.
[7] Intrusion.com, Intrusion Secure Host, white paper available at: www.intrusion.com/products/hids.asp, 203.
[8] W. Jansen, P. Mell,” Mobile Agents in Intrusion Detection and Response”, In Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Ottawa, Canada, Page No (77-91), Sep 210.
[9] C. Kruegel, T. Toth,” Distributed Pattern Detection for Intrusion Detection”, In Proceedings of the Network and Distributed System Security Symposium Conference, Internet Society, Los Angeles, CA, Feb 202.
[10] E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. Stolfo,”A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, in Applications of Data Mining in Computer Security”, 202, S. Jajodia D. Barbara, “Advances In Information Security”, Ed. Boston: Kluwer Academic Publishers, 212.
[11] M. Esmaili, R. Safavi-Naini, B. Balachandran and Pieprzyk, J. “A Case Based Reasoning for Intrusion Detection System”, In Proceedings of the 12th Annual Computer Security Applications Conference, ISSN: 1063-9527, Page No (214 -223), Dec 196.
[12] German Florez-Larrahondo, Zhen Liu, Yoginder S. Dandass, Susan M. Bridges, and Rayford Vaughn, “Integrating Intelligent Anomaly Detection Agents into Distributed Monitoring Systems”, Dynamic Publishers, Inc.Journal of Information Assurance and Security. Volume-1, No-1, ISSN: 1554-1010, Page No (59–77), 206.
[13] C. Krugel, T. Toth,” A Survey on Intrusion Detection Systems”, Technical University of Vienna Technical, report, PageNo (410-417), Apr210, http://citeseerx.ist.psu.edu/viewdoc/summary?.
[14] “Network Intrusion Detection System”, http://en.wikipedia.org/wiki/Network_intrusion_detection_system, Jul 1, 209.
[15] “The concept of Intrusion Detection Systems”, http://maltainfosec.org/archives/26.html, http://rsmus.com/what-we-do/services/risk-advisory/the-ultra-secure-network-architecture.html, 211.
[16] N. Einwechter, “An introduction to distributed intrusion detection systems”, http://www.securityfocus.com/infocus/1532, 202.
[17] Y. Zhang and W. Lee, “Intrusion detection in wireless
adhoc networks”, In Mobile Computing and Networking, MOBICOM , Boston, MA, USA, Page No (275–283), 200.
[18] Ghosh and A. Schwartzbard,”A Study in Using Neural Networks for Anomaly and Misuse Detection”, In Proceedings of the Eighth USENIX Security Symposium, Washington, D.C., Page No (141-152), Aug 199.
[19] Amrita Anand, Brajesh Patel,” An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols”, International Journal Of Advanced Research in Computer Science and Software Engineering, Volume-02, No-08, ISSN: 2277 128X, Page No (94-98), Aug 212.
[20] G. Helmer, J.S.K Wong, V. Honavar and L. Miller, “Intelligent Agents for Intrusion Detection”, In Proceedings of the IEEE Information Technology Conference, Syracuse, NY, Page No (121-124), Sep 207.
[21] Deris Stiawan, Ala’ Yaseen Ibrahim Shakhatreh, Mohd. Yazid Idris, Kamarulnizam Abu
Bakar, Abdul Hanan Abdullah,” Intrusion Prevention System: A Survey”, Journal of Theoretical and Applied Information Technology, Volume-40, No-1, ISSN: 1992-8645, Page No (44-54), June 15, 212.