Intrusion Detection in Wireless Sensor Network using Behaviour Based Technique with Real Time Network Traffic

This paper will look at the nature and structure of wireless sensor network attacks and the tools, actions and processes that can be used to identify and respond to such attacks. A brief overview examining the anatomy of an attack and the creation of botnets will be presented and the motivation that drives such on-line malicious activity, the type of tools that are used in modern attacks, which is behind these and the impact they have will be discussed. Identifying attack streams and understanding the nature of TCP/IP traffic will be discussed through the use of Wireshark and their operation and contribution to combating malicious network activity will be considered. As practical, hands-on exercises, participants will be able to simulate a network attack and response scenario by trying to penetrate a remote network while at the same time protecting their own network from attack. This will be done using the tools and techniques discussed earlier and by remotely accessing a real wireless sensor network (WSN) running in the NS-3 Simulator.

[1]  Philip K. Chan,et al.  Learning Models of Network Traffic for Detecting Novel Attacks , 2002 .

[2]  Ashraf Hossain,et al.  Impact of sensing model on wireless sensor network coverage , 2012, IET Wirel. Sens. Syst..

[3]  Fabio Roli,et al.  Fusion of multiple classifiers for intrusion detection in computer networks , 2003, Pattern Recognit. Lett..

[4]  A. Elfes,et al.  Occupancy Grids: A Stochastic Spatial Representation for Active Robot Perception , 2013, ArXiv.

[5]  Donald F. Towsley,et al.  A study of the coverage of large-scale sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[6]  Philip K. Chan,et al.  PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .

[7]  M. N. Giriprasad,et al.  ENERGY EFFICIENT COVERAGE PROBLEMS IN WIRELESS Ad Hoc SENSOR NETWORKS , 2011 .

[8]  B. Williams,et al.  Operations management. , 2001, Optometry.

[9]  CardeiMihaela,et al.  Energy-efficient coverage problems in wireless ad-hoc sensor networks , 2006 .

[10]  Ricardo Staciarini Puttini,et al.  A Bayesian Classification Model for Real‐Time Intrusion Detection , 2003 .

[11]  Yuh-Ren Tsai,et al.  Sensing coverage for randomly distributed wireless sensor networks in shadowed environments , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[12]  Jack Koziol Intrusion Detection with Snort , 2003 .

[13]  Sushil Jajodia,et al.  Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.