Open Access Open Access  Restricted Access Subscription Access

Techniques of Wireless Intrusion Detection System:T-WIDZ


Affiliations
1 Computer Science and Engineering Department, BHSFGC Vijaya College, Bangalore, India
2 BHSFGC Vijaya College, Bangalore, India
3 Department of Electronics and Communication, CMRIT, Bangalore, India
 

Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection-a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) in computer network security are real-time software assessment by monitoring for suspicious activity at the network and system layer. Software scanner allows network administrator to audit the network for vulnerabilities and thus securing potential holes before attackers take advantage them. The network traffic datasets provided by the DARPA 1998 offline intrusion detection project are used in our empirical investigation, which demonstrates the feasibility and promise of unsupervised learning methods for network intrusion detection using UML diagrams. The goal of this paper is to place some characteristics of good IDS and examine the positioning of intrusion detection as part of an overall layered security strategy and a review of evaluation criteria for identifying and selecting IDS.

Keywords

IDS-Intrusion Detection System, IPS-Intrusion Prevention Systems, WIDZ-Wireless Intrusion Detecting System.
User
Notifications
Font Size

Abstract Views: 243

PDF Views: 2




  • Techniques of Wireless Intrusion Detection System:T-WIDZ

Abstract Views: 243  |  PDF Views: 2

Authors

Rajshekhar M. Patil
Computer Science and Engineering Department, BHSFGC Vijaya College, Bangalore, India
Mamitha R. Patil
BHSFGC Vijaya College, Bangalore, India
K. V. Ramakrishnan
Department of Electronics and Communication, CMRIT, Bangalore, India

Abstract


Recently data mining methods have gained importance in addressing network security issues, including network intrusion detection-a challenging task in network security. Intrusion detection systems aim to identify attacks with a high detection rate and a low false alarm rate. Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) in computer network security are real-time software assessment by monitoring for suspicious activity at the network and system layer. Software scanner allows network administrator to audit the network for vulnerabilities and thus securing potential holes before attackers take advantage them. The network traffic datasets provided by the DARPA 1998 offline intrusion detection project are used in our empirical investigation, which demonstrates the feasibility and promise of unsupervised learning methods for network intrusion detection using UML diagrams. The goal of this paper is to place some characteristics of good IDS and examine the positioning of intrusion detection as part of an overall layered security strategy and a review of evaluation criteria for identifying and selecting IDS.

Keywords


IDS-Intrusion Detection System, IPS-Intrusion Prevention Systems, WIDZ-Wireless Intrusion Detecting System.