RGB Technique of Intrusion Detection in IEEE 802.11 Wireless Mesh Networks

作者: Muhammad Raheel , M Salman Ashraf

DOI:

关键词:

摘要: According to the growth rate of wireless technology, mesh network (WMN) usage is significantly increased according its advantages like inexpensive, fast and easy deployment. WMN have ability, create provide internet access in a cost efficient manner any type area which unable or costly for wire mediums. Security attacks ratio higher rather than other technologies. Spy /Malware infected computers generate malicious traffic, uses valuable resources puts systems at risk. Intrusion detection system (IDS) one possible solutions timely detect intrusions alarm appropriate action. But Limitation many IDS are not response share with all nodes due dynamic topology radio medium. In this paper, proposed framework intrusion all, both standalone cooperative manner. This paper also provides basic sharing mechanism large scale bandwidth networks.

参考文章(11)
Ricardo S Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael De Sousa, Cláudia J Barenco Abbas, L Javier García-Villalba, None, A modular architecture for distributed IDS in MANET international conference on computational science and its applications. pp. 91- 113 ,(2003) , 10.1007/3-540-44842-X_11
Kok-Keong Loo, Shafiullah Khan, Zia Ud Din, Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks The International Arab Journal of Information Technology. ,vol. 7, pp. 435- 440 ,(2010)
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M Belding-Royer, Richard A Kemmerer, An intrusion detection tool for AODV-based ad hoc wireless networks annual computer security applications conference. pp. 16- 27 ,(2004) , 10.1109/CSAC.2004.6
Adam J. Rocke, Ronald F. Demara, CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions Autonomous Agents and Multi-Agent Systems. ,vol. 12, pp. 93- 114 ,(2006) , 10.1007/S10458-005-4195-6
Hao Yang, Xiaoqiao Meng, Songwu Lu, Self-organized network-layer security in mobile ad hoc networks Proceedings of the ACM workshop on Wireless security - WiSE '02. pp. 11- 20 ,(2002) , 10.1145/570681.570683
Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl Levitt, A specification-based intrusion detection system for AODV Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03. pp. 125- 134 ,(2003) , 10.1145/986858.986876
K. Ilgun, R.A. Kemmerer, P.A. Porras, State transition analysis: a rule-based intrusion detection approach IEEE Transactions on Software Engineering. ,vol. 21, pp. 181- 199 ,(1995) , 10.1109/32.372146
D. Djenouri, L. Khelladi, A.N. Badache, A survey of security issues in mobile ad hoc and sensor networks IEEE Communications Surveys and Tutorials. ,vol. 7, pp. 2- 28 ,(2005) , 10.1109/COMST.2005.1593277
Michael A. Davis, Hacking Exposed ,(2000)