Intrusion Detection and Prevention Systems in Wireless Networks

Abstract = 47 times | PDF = 54 times

##plugins.themes.bootstrap3.article.main##

Ibrahim Al-Shourbaji Samaher Al-Janabi

Abstract

In society today, public and personal communication are often carried out through wireless technology. These technologies can be vulnerable to various types of attacks. Attackers can access the signal to listen or to cause more damage on the wireless networks. Intrusion Detection and Prevention System (IDPS) technology can be used to monitor and analyze the signal for any infiltration to prevent interception or other malicious intrusion. An overview description of IDPSs and their core functions, the primary types of intrusion detection mechanisms, and the limitations of IDPSs are discussed. This work perceives the requirements of developing new and sophisticated detection and prevention methods based on, and managed by, combining smart techniques including machine learning, data mining, and game theory along with risk analysis and assessment techniques. This assists wireless networks toremain secure and aids system administrators to effectively monitor their systems.

Keywords

Wireless networks, intrusion-detection and prevention systems, technology, security, risk analysis

References

[1] H. Bidgoli, Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management, John Wiley & Sons, New York.2006.
[2] I. AlShourbaji, “An overview of wireless local area network (WLAN),” International Journal of Computer Science and Information Security, pp. 46-53, 2013.
[3] D. Sivakumar, B.Sivakumar, “Detection and Localization of Attackers in Wireless Networks”, International Review on Computers and Software (IRECOS), pp. 854-864, 2014.
[4] I. AlShourbaji, R. AlAmeer, “Wireless intrusion detection systems (WIDS)”, Advances in Computer Science and its Applications (ACSA), 2013.
[5] M. M. Noor, W. H. Hassan, “Wireless networks: developments, threats and countermeasures”, International Journal of Digital Information and Wireless Communications (IJDIWC), pp.119-134., 2013.
[6] S. Al-Janabi , I. Al-Shourbaji , M. Shojafar, S. Shamshirband, “Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications”, Egyptian Informatics journal, pp. 113-122, 2017.
[7] M. P. M. Rathod, M. V. V.Parode, R.R.Keole, “SECURITY LIMITATIONS AND CHALLENGES IN WIRELESS NETWORKS”, International Journal of Electronics, Communication and Soft Computing Science & Engineering (IJECSCSE), pp. 42-45, 2012.
[8] S. Al-Janabi, I. Al-Shourbaji, “A Study of Cyber Security Awareness in Educational Environment in the Middle East”, Journal of Information & Knowledge Management,1650007, 2016.
[9] U. H.Rao, U.Nayak, “Intrusion Detection and Prevention Systems. The InfoSec Handbook, pp. 225-243, 2014.
[10] Y. Yu, K. Li, W. Zhou, P. Li, P,“Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures”, Journal of Network and Computer Applications, pp. 867-880,‏ 2012.
[11] A. Mishra, A. K. Srivastava,“A Survey on Intrusion Detection System for Wireless Network”, International Journal of Computer Applications, pp.37-40, 2013.
[12] A. Wahid, P. Kumar, “A Survey on Attacks, Challenges and Security Mechanisms in Wireless Sensor Network”, International Journal for Innovative Research in Science and Technology, pp. 189-196,‏ 2015.
[13] Neustar, “DDoS attacks pose biggest threat yet to European businesses”, available at: https://www.neustar.biz/about-us/news-room/press-releases/2015/ddos-attacks-pose-biggest-threat-yet-to-european-businesses. (Accessed 16 May 2015).
[14] T.Bin ,L.Qi, Y. X..Yang, L. Dong, X.Yang, “A ranging based scheme for detecting the wormhole attack in wireless sensor networks,” The Journal of China Universities of Posts and Telecommunications, pp. 6-10, 2012.
[15] W.Shen, P. Ning, X. He, H. Dai, Y. Liu, “MCR Decoding: A MIMO approach for defending against wireless jamming attacks”, In Proceedings of the IEEE on communications and Network Security (CNS), pp. 133-138, 2014.
[16] S.S.Ahamad, I. Al-Shourbaji, S. Al-Janabi, “A secure NFC mobile payment protocol based on biometrics with formal verification”, International Journal of Internet Technology and Secured Transactions, pp. 103-132, 2016.
[17] R.Vijayakumar, K. Selvakumar, K.Kulothungan, A. Kannan, “Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks”, In Proceedings of the ICCSP on communications and Signal Processing (ICCSP), pp. 1635-1639, 2014.
[18] S. S.Wang, K. Q Yan, S. C.Wang, C. W. Liu, “An integrated intrusion detection system for cluster-based wireless sensor networks”, Expert Systems with Applications, 38(12), pp.15234-15243, 2011.
[19] M. A. Aydın, A. H.Zaim, K. G.Ceylan, “A hybrid intrusion detection system design for computer network security”, Computers & Electrical Engineering, pp. 517-526. 2009.
[20] S. M.Hussein, F.H.M Ali, Z. Kasiran, “ Evaluation effectiveness of hybrid IDs using snort with naive Bayes to detect attacks”, In proceedings of the IEEE on Digital Information and Communication Technology and it's Applications (DICTAP), pp. 256-260, 2012.
[21] G. C.Tjhai, S. M.Furnell, M. Papadaki, N. L.Clarke, “A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm”, Computers & Security, pp. 712-723, 2010.
[22] J. Zeng, T. Li, G. Li, H. Li , “A new intrusion detection method based on antibody concentration”, Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, pp. 500-509, 2009
[23] N. B.Anuar, H. Sallehudin, A. Gan, O. Zakari , “Identifying false alarm for network intrusion detection system using data mining and decision tree”, In Proceedings of the World Scientific and Engineering Academy and Society (WSEAS) on Data networks, communications, computers. Stevens Point, Wisconsin, USA, pp. 22-28, 2008
[24] O. Folorunso, F.E. Ayo, Y.E. Babalola , “Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach”, Journal of Information Privacy and Security, pp.181-196. 2016.

[25] S. H. Ali, “Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm”, In proceedings of the DeSE on Developments in eSystems Engineering (DeSE), pp. 259-269, 2013.
[26] M. Salman, B. Budiardjo, K. Ramli, “Key Issues and Challenges of Intrusion Detection and Prevention System: Developing Proactive Protection in Wireless Network Environment.", World Academy of Science, Engineering and Technology, pp. 521-524, 2011.
[27] K. Scarfone,. P. Mell, “Guide to intrusion detection and prevention systems (IDPS)”, Recommendations of the National Institute of Standards and Technology, National Institute of Standards and Technology, Maryland, 2007.
[28] M. E. Whitman, H.J.Mattord, Principles of Information Security”, Thomson Course Technology, Boston, MA, 2005.
[29] C. Y. Ho, Y. C.Lai, I. W.Chen, F. Y.Wang, W. H.Tai,“Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems”, Communications Magazine, pp. 146-154,2012.
[30] M. P. M. Rathod, M. V. V. Parode, R. R. Keole, “SECURITY LIMITATIONS AND CHALLENGES IN WIRELESS NETWORKS”, International Journal of Electronics, Communication and Soft Computing Science & Engineering (IJECSCSE), pp. 42-45,2012.
[31] H. Chaouchi, M. Laurent-Maknavicius, Wireless and Mobile Networks Security, John Wiley & Sons, New York, 2013.
[32] M. Ahmad, S. Taj, T. Mustafa, M. Asri, “Performance analysis of wireless network with the impact of security mechanisms,” In proceedings the ICET of international on Emerging Technologies, pp. 1-6, 2012.
[33] A.Vindašius, “Security state of wireless networks, “Elektronikair Elektrotechnika, pp. 19-22, 2015.
P. S. Kenkre,.,A. Pai, L. Colaco, “Real Time Intrusion Detection and Prevention System”, In Proceedings of the Theory and Applications (FICTA) on Frontiers of Intelligent Computing, pp. 405-411, 2015.

##plugins.themes.bootstrap3.article.details##