1 / 9

A Wireless Intrusion Detection System and a new attack model

A Wireless Intrusion Detection System and a new attack model. ABSTRACT. Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are easy to mount and difficult to detect and stop.

jud
Download Presentation

A Wireless Intrusion Detection System and a new attack model

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Wireless Intrusion Detection System and a new attack model

  2. ABSTRACT • Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are easy to mount and difficult to detect and stop. • We propose a distributed intrusion detection system in which each node monitors the traffic flow on the network and collects relevant statistics about it. • By combining each node’s view we are able to tell if an attack happened or if the channel is just saturated. • We propose here an attack detection mechanism based on shared monitoring of the network by all nodes.

  3. EXISTING SYSTEM • Traditional systems in place for intrusion detection primarily use a method known as “Finger Printing” to identify malicious users. They are complex. • They are rule dependent. The behavior of packets flowing in the network is new, then the system cannot take any decision. So they purely work in the basis of initial rules provided. • It cannot create its own rule depending on the current situation. • It requires manual energy to monitor the inflowing packets and analyze their behavior. • It cannot take decision in runtime. • If the pattern of the packet is new and not present in the records, then it allows the packets to flow without analyzing whether it is an intruder or not. • The packet with a new behavior can easily pass without being filtered.

  4. PROPOSED SYSTEM • It uses matching algorithm, which is an artificial intelligence problem-solving model. • IDS compare learned user characteristics from an empirical to all users of a system. • It includes temporal and spatial information of the network traffic. • It is both network based and host based system. • It can take decision in runtime.

  5. Advantages: • It eliminates the need for an attack to be previously known to be detected because malicious behavior is different from normal behavior by nature. • Using a generalized behavioral model is theoretically more accurate, efficient and easier to maintain than a finger printing system. • It uses constant amount of computer resources per user, drastically reducing the possibility of depleting available resources.

  6. MODULES The modules in this system are, 1. Distributed detection. • Multicasting the Packets to Detect Intruder 2. Matching the List of Events 3. Multicasting the Intruder to the Neighboring nodes 4. Sending Data to the destination

  7. Module Description Distributed detection. • Multicasting the packet to Detect the Intruder: • The basic idea is to set up a monitor at each node in the network to produce evidences and to share them among all the nodes . • An evidence is a set of relevant information about the network state • The initial process is the training process where the source sends the packet with events to all the nodes in the network to detect the intruder

  8. System Requirement Specifications Hardware Requirements: • Processor : Pentium IV • Hard Disk : 80 GB. • RAM : 512 MB. Software Requirements: • Operating system : Windows XP • Technology : Java 1.6

  9. THANK YOU…

More Related