scholarly journals Optimal Performance for Intrusion Detection in WirelessLan Network Using Data MiningTechniques

Author(s):  
K. Raja, Et. al.

The objective of this paper is to identify the intruder of the wireless local area network based on the network and transport layer while accessing the internet within organizations and industries. The Intrusion detection system is the security that attempts to identify anomalies attributes who are trying to misuse a network without authorization and those who have legitimate access to the system but are abusing their privileges. The fact of the existing system deals with a firewall to protect and detect the unauthorized person using Wireless Local Area Network. Since the administrator may block or unblock the intruder based on the priority. This paper presents an enhanced framework, to detect and monitor the anomalies in the wireless sensor networks in an organization or an institution. The proposed approach to detect and filter the intruder in the wireless local area networks. Hence optimize the intrusion detection system in the particular organization or industries. The proposed IDS results are compared with the existing Decision Tree, Naive Bayes, and Random Forest algorithms.

Author(s):  
Achmad Hambali Hambali ◽  
Siti Nurmiati

Flooding Data adalah jenis serangan Denial of Service (DOS) di mana data flooding menyerangkomputer atau server di jaringan lokal atau internet dengan menghabiskan sumber daya yang dimiliki olehkomputer hingga komputer tidak dapat menjalankan fungsinya dengan baik sehingga tidak secara langsungmencegah pengguna lain dari mendapatkan akses ke layanan dari komputer yang diserang. Penelitian ini untukmenganalisis indikasi serangan dan menjaga keamanan sistem dari ancaman banjir data. Untuk itu kitamembutuhkan alat deteksi yang dapat mengenali keberadaan serangan flooding data dengan mengetuk paketdata dan kemudian membandingkannya dengan aturan basis data IDS (berisi paket serangan tanda tangan).Mesin IDS akan membaca peringatan dari IDS (seperti jenis serangan dan penyadap alamat IP) untukmeminimalkan data serangan flooding terhadap LAN (Local Area Network) dan server. Metode pengujian dataserangan banjir dengan menggunakan metode pengujian penetrasi. Tiga sampel uji adalah serangan floodingdata terhadap ICMP, UDP dan protokol TCP menggunakan aplikasi Flooding data. Hasil yang diperolehketika menguji data serangan flooding di mana sensor sensor deteksi dapat mendeteksi semua serangan dansemua sampel serangan dapat dicegah atau disaring menggunakan sistem keamanan jaringan berbasisfirewall.


Author(s):  
Hamizan Suhaimi ◽  
Saiful Izwan Suliman ◽  
Afdallyna Fathiyah Harun ◽  
Roslina Mohamad ◽  
Yuslinda Wati Mohamad Yusof ◽  
...  

<span>Internet connection nowadays has become one of the essential requirements to execute our daily activities effectively. Among the major applications of wide Internet connections is local area network (LAN) which connects all internet-enabled devices in a small-scale area such as office building, computer lab etc. This connection will allow legit user to access the resources of the network anywhere as long as authorization is acquired. However, this might be seen as opportunities for some people to illegally access the network. Hence, the occurrence of network hacking and privacy breach. Therefore, it is very vital for a computer network administrator to install a very protective and effective method to detect any network intrusion and, secondly to protect the network from illegal access that can compromise the security of the resources in the network. These resources include sensitive and confidential information that could jeopardise someone’s life or sovereignty of a country if manipulated by wrong hands.  In Network Intrusion Detection System (NIDS) framework, apart from detecting unauthorized access, it is equally important to recognize the type of intrusions in order for the necessary precautions and preventive measures to take place. This paper presents the application of Genetic Algorithm (GA) and its steps in performing intrusion detection process. Standard benchmark dataset known as KDD’99 cup was utilized with forty-one distinctive features representing the identity of network connections. Results presented demonstrate the effectiveness of the proposed method and warrant good research focus as it promises exciting discovery in solving similar-patent of problems.   </span>


Author(s):  
Chaithra. H. U ◽  
Vani H.R

Now a days in Wireless Local Area Networks (WLANs) used in different fields because its well-suited simulator and higher flexibility. The concept of WLAN  with  advanced 5th Generation technologies, related to a Internet-of-Thing (IOT). In this project, representing the Network Simulator (NS-2) used linked-level simulators for Wireless Local Area Networks and still utilized IEEE 802.11g/n/ac with advanced IEEE 802.11ah/af technology. Realization of the whole Wireless Local Area Networking linked-level simulators inspired by the recognized Vienna Long Term Evolution- simulators. As a outcome, this is achieved to link together that simulator to detailed performances of Wireless Local Area Networking with Long Term Evolution, operated in the similar RF bands. From the advanced 5th Generation support cellular networking, such explore is main because different coexistences scenario can arise linking wireless communicating system to the ISM and UHF bands.


2019 ◽  
Vol 1 (1) ◽  
pp. 90-98
Author(s):  
Ignasius Irawan Budi P

Extensible Authentication Protocol (EAP) is authentication method to protect wireless local area network from un-authorized user which there was interaction between radius servers, access point and client device. When EAP was used as authentication method, the authentication can be strengthened by using TLS (Transport Layer Security) certificate where client device and server will use certificate to verify the identity of each other. The certificate must meet requirement on the server and client for the successful authentication. For this time, the authentication method provides highest level for security in wireless local area network because this method can protect man-in-middle vulnerability.The proposed framework is evaluated by using scenario in testing and live environment to ensure that the authentication has been securely for mutual device authentication.


Author(s):  
Leida Chen ◽  
Ravi Nath ◽  
Jonathan Cowin

Recently, wireless local area network (WLAN) has gained increasing popularity. WLAN equipment manufacturers and practitioners claimed that WLAN had brought dramatic improvements in the forms of productivity gains and attainment of convenience, flexibility, mobility, and time saving to organizations and their employees. However, very little academic research has been conducted to verify these claims and further our understanding of this new phenomenon. By surveying end-users and managers, this study investigates the impact of WLAN on users and their work. User satisfaction with WLAN is also assessed. This article presents the findings from the study along with a discussion on recent development and future trends of WLAN. Finally, recommendations to researchers, managers, WLAN technology providers and equipment manufacturers are also provided.


Sign in / Sign up

Export Citation Format

Share Document