Preview

Comparative Study of Intrusion Detection System for Mobile Ad Hoc Networks

Powerful Essays
Open Document
Open Document
4430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comparative Study of Intrusion Detection System for Mobile Ad Hoc Networks
Comparative Study of Intrusion Detection System for Mobile Ad-Hoc Networks
Eyad R. Manaa, Mahmoud Al-Madhoun and Mahmoud A. Ghanem. Supervisor: Dr. Ayman A. AbuSamra * Abstract In wireless networks the security concerns are considered an important issue, various techniques are used for that purpose. Traditional security mechanisms (authentication, encryption) provide an abstract level of security but some reactive security mechanisms and deep level of inspection is always required. Here some basic intrusion detection systems are discussed and analyzed, and we have shown the advantages and limitations of each technique through a specific comparison between that techniques. And finally we have talked in some details about the HawkEye IDS and we have shown its architecture and mechanism of work, and talked about its advantages over the other IDS we have discussed.

Keywords: Intrusion Detection System (IDS), Mobile Ad Hoc Networks (MANET), Denial of Service, HawkEye.

INTRODUCTION
The subject of Intrusion Detection Systems (IDS) on computer networks has become a topic of great importance for research. Threats against private and public networks are mounting daily thereby, increasing the need for Intrusion Detection Systems (IDS) on network systems throughout the corporate world. IDS serve as a means of identifying, monitoring, blocking and reporting anomalous behavior and unauthorized use of data existing on computer networks. In short, IDS function is to safeguard distributed computing environments that are managed and controlled by a particular network. IDS accomplish their objective by performing through checks on the content of each and every packet, traveling through a given network in efforts to detect intrusions.
This monitoring process provides better security than a firewall could. IDS handle traffic and information, logging every application as it travels through a particular



References: [10] Yi-an Huang, Wenke Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN), Fairfax, Virginia, October 31, 2003.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    1. It can show hackers where to attack and what the most vulnerable parts of the traffic are.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Implementing the installation of an IDS or IPS will allow for suspicious traffic to be flagged and reported to administrators based on one of two different factors. These factors are signature based or anomaly based depending on how they are configured.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Another important security feature for routers and switches are the extended access list (ACLs), which is a rule and must be implemented to control/filter the network traffic from the un-trusted networks. “You can use access lists to restrict contents of routing updates or to provide traffic flow control, One of the most important reasons to configure access lists is to provide security for your network.” [2] The switching device which is a layer 2, have several ports, are proposed to shut down all unused ports and use MAC addresses to avoid any access point (AP) placement. In the proposed Gliffy network diagram, an Intrusion Detection System (IDS) is depicted. "An IDS is a special network device that can detect attacks and suspicious activities." [4] It will just detect threats and will not take any action to stop the attack. It will be accounting firm's analyst responsibility to monitor the logs and interpret them correctly for the false and real time…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity |…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Business

    • 2429 Words
    • 10 Pages

    Intrusion detection is a process that involves monitoring of the events taking place around and within the boundaries of the property. These events are monitored…

    • 2429 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Voip Suitability Analysis

    • 3971 Words
    • 16 Pages

    In the evolving trend of telephony technology, the time of circuit-switched packet-switched telephone network (PSTN) is now the backbone for Voice over Internet Protocol (VoIP). Service providers are in the midst of a gradual evolution from circuit-switched to IP-based packet-switched infrastructures. IP is attractive for two main reasons: cost savings and revenue. Carriers expect operational and infrastructure savings from deploying new IP-based services because they believe that implementing applications on IP networks will be much less expensive than running them on circuit-switched networks. In addition, every carrier is looking for new ways to enhance its service suites, which are rapidly becoming commodities.…

    • 3971 Words
    • 16 Pages
    Powerful Essays