scholarly journals Network Based Intrusion Detection System using Protocol Standardization Techniques

The IDS system identifies the anomaly device which connected in the network communication process through evaluating the MAC address compared with the registered list of devices. In completion, this research work ensures that all the devices which are involved in the network communications are authenticated and secured, which increases the security of the network and prevents the intruder. This research work attempts to increase the quality of service of network communication, ensuring error-free communication through monitoring the network.

2019 ◽  
Vol 7 (4) ◽  
pp. 162-176
Author(s):  
Rajendran N. ◽  
Jawahar P.K. ◽  
Priyadarshini R.

Purpose The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network. Design/methodology/approach It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node. Findings The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches. Research limitations/implications In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA). Practical implications It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time. Social implications When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput. Originality/value The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.


Author(s):  
Simar Preet Singh ◽  
Rajesh Kumar ◽  
Anju Sharma ◽  
S. Raji Reddy ◽  
Priyanka Vashisht

Background: Fog computing paradigm has recently emerged and gained higher attention in present era of Internet of Things. The growth of large number of devices all around, leads to the situation of flow of packets everywhere on the Internet. To overcome this situation and to provide computations at network edge, fog computing is the need of present time that enhances traffic management and avoids critical situations of jam, congestion etc. Methods: For research purposes, there are many methods to implement the scenarios of fog computing i.e. real-time implementation, implementation using emulators, implementation using simulators etc. The present study aims to describe the various simulation and emulation tools for implementing fog computing scenarios. Results: Review shows that iFogSim is the simulator that most of the researchers use in their research work. Among emulators, EmuFog is being used at higher pace than other available emulators. This might be due to ease of implementation and user-friendly nature of these tools and language these tools are based upon. The use of such tools enhance better research experience and leads to improved quality of service parameters (like bandwidth, network, security etc.). Conclusion: There are many fog computing simulators/emulators based on many different platforms that uses different programming languages. The paper concludes that the two main simulation and emulation tools in the area of fog computing are iFogSim and EmuFog. Accessibility of these simulation/emulation tools enhance better research experience and leads to improved quality of service parameters along with the ease of their usage.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Yulong Fu ◽  
Zheng Yan ◽  
Jin Cao ◽  
Ousmane Koné ◽  
Xuefei Cao

Internet of Things (IoT) transforms network communication to Machine-to-Machine (M2M) basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS) is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.


Author(s):  
Abdullah El-Haj ◽  
Shadi Aljawarneh

The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices.


In recent years, wireless sensor network (WSN) is the measure concern over network communication. A number of attacks are occurred at the time of network communication as result it hampers the smooth functionality, data flow and data transmission. In this article, we have proposed a trust-based intrusion detection system for physical layers attacks using DRI and Cross Check method. The HTBIDS is effective method to identify the abnormal nodes in wireless sensor network. The abnormal nodes are attacked by periodic jamming attack. We have considered the periodic jamming attack at physical layer for performance evaluation. Results show that HTBIDS performs better using detection accuracy (DA) and false alarm rate (FAR).


2019 ◽  
Vol 8 (4) ◽  
pp. 11730-11737

Wireless sensor network (WSN) is a noteworthy division in present day correspondence frameworks and faith detecting steering convention is utilized to improve security in WSN. Already, Trust Sensing based Secure Routing Mechanism (TSSRM) was projected which will diminish the overhead steering and improve the unwavering quality of information transmission over the system. In any case, the security tool of this technique might be invalid, if the system steering convention is modified. Hence, in this work, a Parameter and Distributed Trust Based Intrusion Detection System (PDTB-IDS) with a safe correspondence structure with a trust the board framework for remote sensor systems are proposed. The significant commitment is to distinguish different parameters and trust factors that impact trust in WSN is conveyed among different factors, for example, vitality, unwavering quality, information, and so on. Subsequently coordinate believe, proposal believe and circuit trust from those components are determined and the general trust estimation of the sensor hub is evaluated by joining the individual trust esteems. The trust model can decide whether or not the specific hub is pernicious or not by looking at trust got from the proposed method. The numerical assessment of the research work is completed with the help of NS2 simulation environment from which it is proved that the projected strategy provides enhanced outcome than the present TSSRM method.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Abhijit Dnyaneshwar Jadhav ◽  
Vidyullatha Pellakuri

AbstractNetwork security and data security are the biggest concerns now a days. Every organization decides their future business process based on the past and day to day transactional data. This data may consist of consumer’s confidential data, which needs to be kept secure. Also, the network connections when established with the external communication devices or entities, a care should be taken to authenticate these and block the unwanted access. This consists of identification of the malicious connection nodes and identification of normal connection nodes. For that, we use a continuous monitoring of the network input traffic to recognize the malicious connection request called as intrusion and this type of monitoring system is called as an Intrusion detection system (IDS). IDS helps us to protect our network and data from insecure and malicious network connections. Many such systems exists in the real time scenario, but they have critical issues of performance like accuracy and efficiency. These issues are addressed as a part of this research work of IDS using machine learning techniques and HDFS. The TP-IDS is designed in two phases for increasing accuracy. In phase I of TP-IDS, Support Vector Machine (SVM) and k Nearest Neighbor (kNN) are used. In phase II of TP-IDS, Decision Tree (DT) and Naïve Bayes (NB) are used, where phase II is the validation phase of the system for increasing accuracy. Also, both the phases are having Hadoop distributed file system underlying data storage and processing architecture, which allows parallel processing to increase the speed of the system and hence achieve the efficiency in TP-IDS.


Wireless technology has become one of the integral part of our daily life, it is the 21st century technology, emergency of wireless network have led the multimedia distribution very effectively. Moreover the video has been an eminent media for communications as well as for the entertainment purpose for past several decades. Due to improvisation in technologies people can communicate over face to face over the wireless network without any concern about the distance, hence the video transmission over the wireless network has become one of the interesting application in daily life. Moreover, it is very important to maintain good QoS (Quality of Service) such as effective bandwidth, routing protocols and other QoS parameters. In this paper, we have surveyed the extensive amount of research paper to understand the Quality of service, meanwhile we have extensively discussed the various existing methodology, which has helped in improvising the wireless network for video transmission. Moreover the main aim of this research work is to survey and address all the requirement along with challenges that occurs while designing the wireless network, also this survey unveils the recent development in optimization, algorithm, novel approach and the protocols for improvising the Quality of Service


Sign in / Sign up

Export Citation Format

Share Document