CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Intrusion Detection in Wireless Network using BIOS and Motherboard Serial Number

by Hiral Vegda, Nimesh Modi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 6
Year of Publication: 2017
Authors: Hiral Vegda, Nimesh Modi
10.5120/ijca2017913655

Hiral Vegda, Nimesh Modi . Intrusion Detection in Wireless Network using BIOS and Motherboard Serial Number. International Journal of Computer Applications. 164, 6 ( Apr 2017), 16-19. DOI=10.5120/ijca2017913655

@article{ 10.5120/ijca2017913655,
author = { Hiral Vegda, Nimesh Modi },
title = { Intrusion Detection in Wireless Network using BIOS and Motherboard Serial Number },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 6 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number6/27487-2017913655/ },
doi = { 10.5120/ijca2017913655 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:34.114760+05:30
%A Hiral Vegda
%A Nimesh Modi
%T Intrusion Detection in Wireless Network using BIOS and Motherboard Serial Number
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 6
%P 16-19
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increase in use of wireless network has changed the view of network security. The wireless network is particularly susceptible due to its cooperative algorithms, features of open medium, dynamic changing topology, and lack of centralized monitoring and a clear line of protection. The traditional way of protecting wireless networks with firewalls and encryption software is not enough. The current trend in wireless security shows that new types of attacks are evolving at a fast rate and as many intrusion detection techniques have been developed on fixed wired networks but have been turned to be inapplicable in this new environment so, we need to search for new architecture and mechanisms to protect wireless networks and mobile computing applications. This paper firstly indicates the history of intrusion detection, then the problem in using MAC address as unique identification and then how BIOS, motherboard serial number can be used for intrusion detection.

References
  1. Kirti, “Basic Concepts of Wireless Network”, International Journal of Science and Research (IJSR), ISSN 2319-7064.
  2. Available: http://www.webopedia.com/TERM/8/802_11.html
  3. Peng Ning, Sushil Jajodia, xiaoyang Sean Wang. 2001. Abstraction-Based Intrusion Detection In Distributed Environments. ACM Transaction on Information and System Security, Vol. 4, No. 4.
  4. Fadia Ankit, Ebook on Network Security, 2006
  5. Shrikanth Ramesh. 2014. How to Hack Hacking Secretes Exposed. http://howtohack.gohacking.com
  6. Sungmo Jung, Jong Kim, Seoskoo Kim, “A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment”, http://link.springer.com/chapter/10.1007%2F978-3-642-23312-8_4
  7. Hatkar Archana A, Varade Gauri A, Hatkar Arvind P. 2012. Media Access Control Spoofing Techniques and its Counter Measures. International Journal of Scientific & Engineering Research, Volume 2, Issue 6, ISSN 2229-5518.
  8. Pandit Amita, Gond Sunita. 2013. Analysis for Improving Intrusion Detection System in Wireless Network. International Journal of Advanced Research in Computer Science and Software Engineering.http:// www.ijarcsse.com
  9. Takahashi Daishuke, Xiao Yang, Zhang Yan, Chatzimisios Periklis, Chen Hsiao-Hwa. 2010. “IEEE 802.11 User Fingerprinting and its applications for Intrusion Detection”, Computers and Mathematicswith Applications.http://www.sciencedirect.com/science/article/pii/S0898122110000131
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Intrusion Detection MAC (Media Access Control) Spoofing BIOS (Basic Input Output System) Filtering Motherboard Serial Number.