scholarly journals DESIGN OF WIRELESS INTRUSION DETECTION SYSTEM FOR DOS ATTACK AND MALICIOUS ACCESS POINT IN WI-FI NETWORKS

2020 ◽  
Vol 7 (06) ◽  

Internet of Things (IoT) is a network spread globally and accommodates maximum things under it. All these things are connected globally using IPv6 protocol which satisfies the need of connecting maximum devices by supporting 2^128 addresses. Because of heavy-weight nature of IPv6 protocol, a compressed version of it known as IPv6 Low Power Personal Area Network (6LoWPAN) protocol is used for a resource-constrained network that communicates over low power and lossy links. In IoT, devices are resource-constrained in terms of low battery power, less processing power, less transceiver power, etc. Also these devices are directly connected to insecure internet hence it is very challenging to maintain security in IoT network. In this paper, we have discussed various attacks on 6LoWPAN and RPL network along with countermeasures to reduce the attacks. DoS attack is one of the severe attacks in IoT which has various patterns of execution. Out of various attacks we have designed Intrusion Detection System (IDS) for Denial of Service (DOS) attack detection using Contiki OS and Cooja simulator.


Author(s):  
Vijander Singh ◽  
Ramesh C. Poonia ◽  
Linesh Raja ◽  
Gourav Sharma ◽  
Narendra Kumar Trivedi ◽  
...  

Intrusion detection system (IDS) is a software application that gives the facility to monitor the traffic of network, event, or activities on networks and finds if any malicious operation occurs. Hackers use different types of attacks to capture the information and use brute force attacks to match the authenticated key with the key, which the hacker has in its stable. When there is a match, the hacker gets the authenticated key through which he can connect with the hotspot or AP. IDS finds invalid or any other misbehavior in the system. The protocol will take care of it; protocol checks the MAC address of the device which wishes to connect with the hotspot or AP, and if any device repeatedly enters a wrong password, the protocol will gives a pop up on the administrator system. The objective of this chapter is to provide information about the protocol that behaves like IDS and is pre-implemented in the routers, which gives the alert to the administrator if any intruder tries to connect with the hotspot or AP (access point) with the rapid wrong key.


Author(s):  
Ashish Pandey ◽  
Neelendra Badal

Machine learning-based intrusion detection system (IDS) is a research field of network security which depends on the effective and accurate training of models. The models of IDS must be trained with new attacks periodically; therefore, it can detect any security violations in the network. One of most frequent security violations that occurs in the network is denial of service (DoS) attack. Therefore, training of IDS models with latest DoS attack instances is required. The training of IDS models can be more effective when it is performed with the help of machine learning algorithms because the processing capabilities of machine learning algorithms are very fast. Therefore, the work presented in this chapter focuses on building a model of machine learning-based intrusion detection system for denial of service attack. Building a model of IDS requires sample dataset and tools. The sample dataset which is used in this research is NSL-KDD, while WEKA is used as a tool to perform all the experiments.


2013 ◽  
Vol 10 (6) ◽  
pp. 1779-1784 ◽  
Author(s):  
Punit Gupta ◽  
Pallavi Kaliyar

Cloud Computing provides different types of services  such as SaaS, PaaS, IaaS. Each of them have their own security challenges, but IaaS undertakes all types of challenges viz., network attack ,behaviour based attack, request based attacks  i.e handling the requests from untrusted users, XSS (cross site scripting attack), DDOS and many more. These attacks are independent of each other and consequently the QoS provided by cloud is compromised. This paper proposes a History aware Behaviour based IDS (Intrusion Detection System) BIDS. BIDS provides detection of untrusted users, false requests that may lead to spoofing, XSS  or DOS attack and many more such attacks. In addition,  certain cases where user login or password is compromised. History aware BIDs can be helpful in detecting such attacks and maintaining the QoS provided to the user in cloud IaaS ( Infrastructure as a service).


2020 ◽  
Vol 8 (4) ◽  
pp. 375
Author(s):  
Finandito Adhana ◽  
I Ketut Gede Suhartana

Denial of Service (DoS) attacks are increasingly dangerous. This DoS attack works by sending data packets continuously so that the target being attacked cannot be operated anymore. DoS attacks attack the most websites, thus making the website inaccessible. An anomaly based intrusion detection system (IDS) is a method used to detect suspicious activity in a system or network on the basis of anomaly pattern arising from such interference. Wireshark is software used to analyze network traffic packets that have various kinds of tools for network professionals.


2016 ◽  
Vol 10 (5) ◽  
pp. 18-26
Author(s):  
Mishti D. ◽  
Miren Karamta ◽  
Jitendra Bhatia ◽  
M.B. Potdar

Sign in / Sign up

Export Citation Format

Share Document