Hybrid architecture with misuse and anomaly detection techniques for wireless networks

The growing utilization of Internet administration in the recent years has facilitated an increment in the various types of attacks. Despite the best protection measures, many attacks have been effectively done against many organization and enterprises. Anomaly detection, misuse detection are used to detect various type of attacks. Anomaly detection produce high rate of false alarms and the later one produce less number of false alarms but it is not much efficient than the previous one. In this paper we proposed a new method by combining both detection method in real time and tried to overcome the drawbacks of existing techniques.

[1]  Xu Qiao-ping,et al.  Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .

[2]  Mohammad Zulkernine,et al.  DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[3]  Mohammad Saiful Islam Mamun,et al.  Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network , 2010, ArXiv.

[4]  Donald F. Towsley,et al.  Mobility improves coverage of sensor networks , 2005, MobiHoc '05.

[5]  Patrick Thiran,et al.  Delay of intrusion detection in wireless sensor networks , 2006, MobiHoc '06.

[6]  Kenichi Yoshida,et al.  Entropy based intrusion detection , 2003, 2003 IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490).

[7]  M. Asaka,et al.  A method of tracing intruders by use of mobile agents , 1999 .

[8]  Muhammad Usman,et al.  Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks , 2012 .

[9]  Xin Chen,et al.  Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[10]  Wayne A. Jansen,et al.  Intrusion detection with mobile agents , 2002, Comput. Commun..

[11]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[12]  Hossein Jadidoleslamy,et al.  A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS , 2011 .

[13]  Bharat Bhargava,et al.  On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[14]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[15]  J.A. Ritcey,et al.  Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.