CFP last date
20 May 2024
Reseach Article

Survey on Wireless Intrusion Detection Mechanisms

by Moble Jacob, Rasmi P.S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 140 - Number 12
Year of Publication: 2016
Authors: Moble Jacob, Rasmi P.S.
10.5120/ijca2016909523

Moble Jacob, Rasmi P.S. . Survey on Wireless Intrusion Detection Mechanisms. International Journal of Computer Applications. 140, 12 ( April 2016), 33-36. DOI=10.5120/ijca2016909523

@article{ 10.5120/ijca2016909523,
author = { Moble Jacob, Rasmi P.S. },
title = { Survey on Wireless Intrusion Detection Mechanisms },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 140 },
number = { 12 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume140/number12/24647-2016909523/ },
doi = { 10.5120/ijca2016909523 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:42:06.221476+05:30
%A Moble Jacob
%A Rasmi P.S.
%T Survey on Wireless Intrusion Detection Mechanisms
%J International Journal of Computer Applications
%@ 0975-8887
%V 140
%N 12
%P 33-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless communication is technology’s one of the promising contributions to mankind. Wireless networks are widely used to transfer sensitive data such as bank details, credit card details, emails etc nowadays. The intrusion detection system for wired network cannot be applied directly for wireless networks. Wireless network does not have specific boundaries since the nodes are moving. Wireless networks are more vulnerable to attacks such as denial of service, spoofing attacks, session hijacking etc. It is easy for the attacker to intrude into the system since no physical connection is needed. This paper deals with the survey of some of the methods used in intrusion detection in wireless network.

References
  1. A. Sheth, C. Doerr, D. Grunwald, R. Han, and D. Sicker, “MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs”, in Proceedings of the 4th international conference on Mobile systems, applications and services, June 19-22, 2006, Uppsala, Sweden.
  2. Sheng, Y., Tan, K., Chen, G., Kotz, D. and Campbell, A. “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength”, in Proceeding IEEE 27th Annual Conference on Computer Communications (INFOCOM), April 2008.
  3. W.M.Suski II, M.A.Temple, M.J.Mendenhall, and R.F.Mills, “Using spectral fingerprints to improve wireless network security”, in proceedings of the IEEE Global Communications Conference (GLOBECOM), December 2008.
  4. Q. Li, and W. Trappe, “Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships”, Information Forensics and Security, IEEE Transactions on , vol.2, no.4, pp.793-808, Dec. 2007.
  5. M. Raya, J.P. Hubaux, and Imad Aad, “DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots”, in Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys '04), ACM, New York, NY, USA.
  6. A.G.Fragkiadakis, V.A.Siris, and A.P.Traganitis, "Effective and robust detection of jamming attacks". Future Network and Mobile Summit, 2010, vol., no., pp.1-8, 16-18 June 2010.
  7. D. Dasgupta, F. Gonzalez, K. Yallapu and M. Kaniganti, “Multilevel monitoring and detection systems (MMDS)”, in Proceedings of the 15th Annual Computer Security Incident Handling Conference, Ottawa, Canada, 2003.
  8. J. Yang, Y. Chen, W. Trappe, J. Cheng, "Detection and Localization of Multiple Spoofing Attackers in Wireless Networks", Parallel and Distributed Systems, IEEE Transactions on , vol.24, no.1, pp.44,58, Jan. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless intrusion detection Dos attack Management frames.