Preview

Intrusion Detection Systems in Wireless Sensor Networks

Powerful Essays
Open Document
Open Document
2943 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intrusion Detection Systems in Wireless Sensor Networks
2012

A Survey of Intrusion Detection Systems for Wireless Sensor Networks
Report
This is the paper review of the paper “A survey of Intrusion detection systems in WSNs by Ashfaq Hussain Farooqi and Farrukh Aslam Khan”. This report is being submitted to Madam. Dr. Mehreen Afzal in the course “Advanced Cryptography and Cryptanalysis” by “Iftikhar Zafar”

Center For Advance Studies In Engineering, CASE, Islamabad, Pakistan 12/22/2012

2

ABSTRACT:

Wireless sensor networks (WSNs) are in a wide usage. Many applications in military, ecology use them, which often need sensitive information. Security is therefore really important in WSNs. But many constraints of WSNs make security a challenge. Various kinds of attacks can target the network resultants in performance degradations and wrong info. The key management, authentication and secure routing protocols don’t secure WSNs against internal breach. IDS are a solution to this issue. Various approaches have been proposed. In this paper, different types of attacks on WSNs, various approaches of detection mechanisms in a WSNs are discussed. Introduction WSNs are a great advancement in wireless communication. They comprise of sink or base and a no. of sensor nodes deployed S.node gather useful info from their surroundings and transmits it to sink or BS which is user controlled Some app of WSNs at involve battle surveillance, volcanic observation, animal movement observation, tsunami prediction etc. WSNs are of interest to adversary as they are deployed in open and unprotected environments. In order to handle unknown attacks preservative mechanisms can be applied. Intrusion detection mechanisms can prevent intrudes and also acquires info about attacks techniques which can be useful in deploying prevention schemes. WSNs consist of sensor nodes and sink or base station(BS). Sensor nodes are small sized, low power and self-controlled. These nodes have low memory, less computation capacity and limited battery life.



References: [1]. Ashfaq Hussain Farooqi, Farrukh Aslam Khan “A survey of Intrusion Detection Systems for Wireless Sensor Networks” [2].David Culler, Deborah Estrin, Mani Srivastava (2004)”Overview of Sensor Networks” [3].Ruchi Bhatnagar, Dr. A.K. Srivastava, Anupriya Sharma(2010)” An Implementation Approach for Intrusion Detection System in Wireless sensor Network” , International Journal on Computer Science and Engineering Vol. 02. [4]. Dmitriy Martynov, Jason Roman, Samir Vaidya, and Huirong Fu (2007)” Design and Implementation of an Intrusion Detection System for Wireless Sensor Networks”. [5]. Yong Wang, Garhan Attebury, Byrav Ramamurthy (2006)” A Sur vey of Security Issues In Wireless Sensor Networks”. *6+. Teresa F.Lunt (1993)”A Survey of Intrusion detection techniques”. [7]. DOUGLAS J. BROWN, BILL SUCKOW, and TIANQIU WANG“A Survey of Intrusion Detection Systems”. 8 [8]. Vera Marinova-Boncheva (2007)” A Short Survey of Intrusion Detection Systems”. *9+. Stefan Axelsson (1999)”Research in IntrusionDetection systems: A Survey”.

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Another important security feature for routers and switches are the extended access list (ACLs), which is a rule and must be implemented to control/filter the network traffic from the un-trusted networks. “You can use access lists to restrict contents of routing updates or to provide traffic flow control, One of the most important reasons to configure access lists is to provide security for your network.” [2] The switching device which is a layer 2, have several ports, are proposed to shut down all unused ports and use MAC addresses to avoid any access point (AP) placement. In the proposed Gliffy network diagram, an Intrusion Detection System (IDS) is depicted. "An IDS is a special network device that can detect attacks and suspicious activities." [4] It will just detect threats and will not take any action to stop the attack. It will be accounting firm's analyst responsibility to monitor the logs and interpret them correctly for the false and real time…

    • 940 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Introducing ISS…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The signature based technique is easier for deployment, since it does not need to learn the environment[5]. It is very effective against known attacks, but it cannot detect new intrusions until it is updated with the new signatures on its database.Therefore, they are easy to evade and can be easily bypassed by intruders by modifying known attack signatures and also target systems, that are not updated with new signatures that detect the modification. The architecture shown in Fig.1, uses the preprocessing to evaluate the signature and compare those signatures to the known signatures in the database. If there is a match then alert is issued, else the detection system does…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Gandhi, M. , & Srivatsa, S. Detecting and preventing attacks using network intrusion. International Journal of Computer Science and Security, 2(1), 49-60. Retrieved , from http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/Volume2/Issue1/IJCSS-28.pdf…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    In recent years, countries around the world have been developing rules and regulations which are designed to support data confidentiality and security. Many organizations have spent decades on building stronger defenses against intrusion, including firewalls, anti-virus software, email security, identity access badges, security policies and procedures. These protections have made the business world more effective at blocking threats and attacks from the outside and made it increasingly difficult for hackers and viruses to penetrate into the system. However these protections provide only a first line of defense since it is designed to prevent unauthorized access.…

    • 4039 Words
    • 17 Pages
    Best Essays
  • Powerful Essays

    Voip Suitability Analysis

    • 3971 Words
    • 16 Pages

    In the evolving trend of telephony technology, the time of circuit-switched packet-switched telephone network (PSTN) is now the backbone for Voice over Internet Protocol (VoIP). Service providers are in the midst of a gradual evolution from circuit-switched to IP-based packet-switched infrastructures. IP is attractive for two main reasons: cost savings and revenue. Carriers expect operational and infrastructure savings from deploying new IP-based services because they believe that implementing applications on IP networks will be much less expensive than running them on circuit-switched networks. In addition, every carrier is looking for new ways to enhance its service suites, which are rapidly becoming commodities.…

    • 3971 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.…

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Improving Network Topology

    • 2806 Words
    • 12 Pages

    References: Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800-94). http://csrc.ncsl.nist.gov/publications/nistpubs/800-94/SP800-94.pdf. Retrieved 1 January 2010. Whitman, Michael E.; Mattord, Herbert J. (2008). Principles of Information Security. Course Technology. pp. 290–301. ISBN 9781423901778. Anderson, Ross (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. New York: John Wiley & Sons. pp. 387–388. ISBN 9780471389224. Anderson, James P., "Computer Security Threat Monitoring and Surveillance," Washing, PA, James P. Anderson Co., 1980. Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119–131 Lunt, Teresa F., "IDES: An Intelligent System for Detecting Intruders," Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, Italy, November 22–23, 1990, pages 110–121. Lunt, Teresa F., "Detecting Intruders in Computer Systems," 1993 Conference on Auditing and Computer Technology, SRI International Sebring, Michael M., and Whitehurst, R. Alan., "Expert Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference, October, 1988 Smaha, Stephen E., "Haystack: An Intrusion Detection System," The Fourth Aerospace Computer Security Applications Conference, Orlando, FL, December, 1988 Vaccaro, H.S., and Liepins, G.E., "Detection of Anomalous Computer Session Activity," The 1989 IEEE Symposium on Security and Privacy, May, 1989 Teng, Henry S., Chen, Kaihu, and Lu, Stephen C-Y, "Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns," 1990 IEEE Symposium on Security and Privacy…

    • 2806 Words
    • 12 Pages
    Powerful Essays