CFP last date
22 April 2024
Reseach Article

Agent based IPS for WLAN

by S V Athawale, D N Chaudhari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 5
Year of Publication: 2013
Authors: S V Athawale, D N Chaudhari
10.5120/13737-1539

S V Athawale, D N Chaudhari . Agent based IPS for WLAN. International Journal of Computer Applications. 79, 5 ( October 2013), 20-22. DOI=10.5120/13737-1539

@article{ 10.5120/13737-1539,
author = { S V Athawale, D N Chaudhari },
title = { Agent based IPS for WLAN },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 5 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number5/13737-1539/ },
doi = { 10.5120/13737-1539 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:13.946187+05:30
%A S V Athawale
%A D N Chaudhari
%T Agent based IPS for WLAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 5
%P 20-22
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The growing technology of the Wireless LAN (WLAN) 802. 11-based it also increases its threat of security attacks. This paper presents an overview and solution of better intrusion prevention system (IPS). We conducted experiments to comprehend the impact of various attacks, study the various probabilities under most dangerous attacks. However the earlier proposed solution to prevent the attacks on WLAN is not efficient. Its challenge to design such a system who gives us better result against the attacks. We propose an hybrid approach for deep packet inspection over network traffic resolve unauthorized, attacker. The experimental results yield satisfactory performance for the hybrid approach.

References
  1. Alexandros Tsakountakis, Georgios Kambourakis and Stefanos Gritzalis, 2007. Towards effective Wireless Intrusion Detection in IEEE 802. 11i.
  2. Xiao qiang Peng,Cheng Zhang, Dian gang Wang, 2010. The intrusion Detection System design in WLAN based on Rogue AP.
  3. Huan—Rong Tang, Rou-Ling Sun, Wel-Qiang Kong,2009. Wireless Intrusion Detection For Defending Agaunst TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK.
  4. Debabrata Nayak, 2007. An Adaptive and Optimized Security Policy Manager for Wireless Networks.
  5. Yaqing Zhang,Srinivas ,2010. Client-based Intrusion Prevention System for Wireless LANs 802. 11.
  6. Khalil El-Khatib, 2010. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems.
  7. Samer Fayssal,Byoung Uk Kim,2010. Performance Analysis Toolset for Wireless Intrusion Detection Systems.
  8. Sunghyuck Hong,Sunho Lim,2010. Analysis of Attack Models via Unified Modeling Language in Wireless Sensor Networks: A Survey Study.
  9. Shanshan Jiang and Yuan Xue, 2009. Optimal Wireless Network Restoration Under Jamming Attack.
  10. Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Jason Chiang, 2004. Policy-Based Mobile Ad Hoc Network Management*.
  11. Hua Li, Dimitri Reizvikh and Lucy (Liang) Lei,2007. An Improved Defense Scheme Against Attacks On Wireless Security.
  12. Larry Korba, 1998. Security System for reless Local Area Networks.
Index Terms

Computer Science
Information Sciences

Keywords

LAN: Local Area Network IPS: Intrusion prevention system WLAN: Wireless Local Area Networks.