Preview

Intrusion Detection Technique for Wireless Sensor Network and Its Implementation Issues

Powerful Essays
Open Document
Open Document
10631 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intrusion Detection Technique for Wireless Sensor Network and Its Implementation Issues
Cover Page
INTRUSION DETECTION TECHNIQUE FOR WIRELESS SENSOR NETWORK AND ITS IMPLEMENTATION ISSUES
BY
OMBU DIENEBI
DSPZ/H/SST/10/15601

DEPARTMENT OF COMPUTER SCIENCE,
SCHOOL OF SCIENCE AND TECHNOLOGY,
DELTA STATE POLYTECHNIC, OZORO
SEPTEMBER, 2012

Title Page
INTRUSION DETECTION TECHNICQUE FOR WIRELESS SENSOR NETWORK AND ITS IMPLEMENTATION ISSUES
BY
OTOIKHIAN OHIMAI GABRIEL
DSPZ/H/SST/10/15601
A PROJECT REPORT SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE, SCHOOL OF SCIENCE AND TECHNOLOGY, DELTA STATE POLYTECHNIC, OZORO
IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF HIGHER NATIONAL DIPLOMA (HND) IN COMPUTER SCIENCE
OCTOBER, 2012

Declaration
I hereby declare that this project is entitled “Intrusion Detection Technique for Wireless Sensor Network and its Implementation Issues” is an original of my research work. All published literatures used are duly reference.

Otoikhian Ohimai Gabriel | | Date | The above declaration is hereby confirmed | | | | Mr. Wilfred Adigwe | | Date |

Certification
This is to certify that this project entitled “Intrusion Detection Technique for Wireless Sensor Network and its Implementation Issues” submitted by Otoikhian Ohimai Gabriel, meets the regulations governing the award of Higher National Diploma (HND) in Computer Science and it is hereby, approved for its contributions to knowledge and literature presentation.

Mr. Wilfred AdigweProject Supervisor | | Date | Mr. Wilfred AdigweHead of Department | | Date | Dean School of Science & Technology | | Date |

Dedication
This project is dedicated to Jehovah Almighty and to the entire family of Pa. G. U. Otoikhian, Children, Grandchildren, Great Grandchildren and the unborn.

Acknowledgement
In the first instance, I wish to return all glory to Jehovah almighty for His abundant grace, blessing and favour during my stay in this school and in this project. I specifically acknowledge my family members especially my



References: Bace. R (2000): “Intrusion Detection”. MacMillan Technical Publishing London Bhuse V., Terwilliger M., Gupta A., Kamal Z Bhargava, S and Agrawal, D. (2001) “Security enhancements in AODV protocol for wireless adhoc networks”, in Proceedings of Vehicular Technology Conference,. Chebrolu S., Abraham A. and Thomas J.( 2004.) Feature Deduction andEnsemble Design of Intrusion Detection Systems, Computers and Security, Elsevier Science, 2005 (in press). http://dx.doi.org/10.1016/j.cose. Chaudhary, V., (2007) “Wireless sensor network security - a survey”, Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, CRC Press. Denning, D.(1987): “An Intrusion Detection Model”, IEEE Transactions on Software Engineering, 13(2):222—232, Du, W., Fang, L Duarte-Melo E. J. and M. Liu. (2000): Analysis of energy consumption and Lifetime of heterogeneous wireless sensor networks. Ephremides, A. Wieselthier, J. and Baker, D (1987.) “A design concept for reliable mobile radio networks with frequency hopping signaling”, Proceedings of the IEEE, 75(1):56-73, Jan. Estrin, D. Govindan, R. Heidemann, R.S. and Kumar, S. (1999.) Next century challenges: Scalable coordination in sensor networks. In Mobile Computing and Networking, pages 263 Fernandes, L Huang, Y. and W. Lee, (2003): “A Cooperative Intrusion Detection System for Adhoc Networks,” In Proceedings of the ACM Workshop on Security of Adhoc and Sensor Networks (SASN '03), Fairfax VA. Intanagonwiwat, C., Govindan, R. & Estrin, D., (2003) “Directed Diffusion for Wireless Sensor Networking”, IEEE/ACM Transaction on Networking, VOL. 11, NO. 1. Intanagonwiwat, C Govindan R, and Estrin, D (2000.) “Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks”, Mobile Computing and Networking, pages 56-67 J John A. Stankovic (2006). Wireless Sensor Networks (pp. 1-11). Charlottesville, Virginia 22904. Kumar, S. (1995): “Classification and detection of computer intrusions”, PhD thesis, Purdue University, Karlof, C Lin, R., Wang, Z. & Sun, Y., (2004) “Wireless Sensor Networks Solutions for Real Time Monitoring of Nuclear Power Plant in”, The Proceedings of the 5’ World Congress on intelligent Control and Automation, Hangzhou, P.R. China. lead, N.R Perkins, C. and P. Bhagwat. (1994) “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”, proceedings of the ACM SIGCOMM. Royer E.M. and Toh C-K (1999) “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks”, IEEE Personal Communications. Saxena, M., (2007) “Security in Wireless Sensor Networks – A Layer based classification”, Technical Report [CERIAS TR 2007-04], Center for Education and Research in Information Assurance and Security - CERIAS, Purdue University. Wang, W and Lu, A. (2004): “ Interactive wormhole detection in large scale wireless networks” Wei Ye Heidemann, J Woo, A. and Culler, D., (2001) “A Transmission Control Scheme for Media Access in Sensor Networks”, Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2001), Rome, Italy. Zhang Y and Lee W. (2000) "Intrusion detection in wireless adhoc networks," ACM MOBICOM. Zhu, S. Setia, S. and Jajodia. S(2003): efficient security mechanisms for large-scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 62, New York, NY, USA.

You May Also Find These Documents Helpful

  • Best Essays

    IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std. 802.1X (2004).…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Powerful Essays

    Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Gandhi, M. , & Srivatsa, S. Detecting and preventing attacks using network intrusion. International Journal of Computer Science and Security, 2(1), 49-60. Retrieved , from http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/Volume2/Issue1/IJCSS-28.pdf…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Method: The experiment appears to have been flawed. Weiss (1972) repeated the experiment on rats (these lack the aaahhh value of monkeys). He found no difference between ‘executives’ and ‘controls.’ The researchers noticed that in the original study Brady had used the most active and ‘extrovert’ monkeys as executives. They concluded that it wasn’t being in control that had killed the monkeys but their ‘personality’ or behaviour type.’…

    • 269 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Radack, S. (n.d.), SECURITY FOR WIRELESS NETWORKS AND DEVICES, WIRELESS TECHNOLOGY AND SECURITY, retrieved from http://itl.nist.gov/lab/bulletns/bltnmar03.htm…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    Thiel, J. (2012). IDS/IPS: An Introduction to Intrusion Detection and Prevention Systems. Retrieved on February 6th, 2013, from http://www.ece.drexel.edu/telecomm/Talks/thiel.pdf…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    Improving Network Topology

    • 2806 Words
    • 12 Pages

    References: Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800-94). http://csrc.ncsl.nist.gov/publications/nistpubs/800-94/SP800-94.pdf. Retrieved 1 January 2010. Whitman, Michael E.; Mattord, Herbert J. (2008). Principles of Information Security. Course Technology. pp. 290–301. ISBN 9781423901778. Anderson, Ross (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. New York: John Wiley & Sons. pp. 387–388. ISBN 9780471389224. Anderson, James P., "Computer Security Threat Monitoring and Surveillance," Washing, PA, James P. Anderson Co., 1980. Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119–131 Lunt, Teresa F., "IDES: An Intelligent System for Detecting Intruders," Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, Italy, November 22–23, 1990, pages 110–121. Lunt, Teresa F., "Detecting Intruders in Computer Systems," 1993 Conference on Auditing and Computer Technology, SRI International Sebring, Michael M., and Whitehurst, R. Alan., "Expert Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference, October, 1988 Smaha, Stephen E., "Haystack: An Intrusion Detection System," The Fourth Aerospace Computer Security Applications Conference, Orlando, FL, December, 1988 Vaccaro, H.S., and Liepins, G.E., "Detection of Anomalous Computer Session Activity," The 1989 IEEE Symposium on Security and Privacy, May, 1989 Teng, Henry S., Chen, Kaihu, and Lu, Stephen C-Y, "Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns," 1990 IEEE Symposium on Security and Privacy…

    • 2806 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    This report on “Wireless Network Security” is submitted in accordance with your assignment for November 23, 2010.…

    • 6120 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    HP S Intrusion Prevention System (IPS) N Series Data sheet Product overview The HP S Intrusion Prevention System (IPS) N Series achieves a new level of inline, real-time protection, providing proactive network security for today's and tomorrow's real-world network traffic and data centers. The IPS platform's next-generation architecture adds significant capacity for deep packet traffic inspection, and its modular software design enables the addition of valuable network protection services to its proven intrusion prevention solution. This new industry-leading IPS platform redefines intrusion prevention as a foundation for comprehensive network security.…

    • 3933 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    This project is dedicated to our families for their understanding and patience especially our father and mother and my elder brother, to our H.O.D., Mr. Aneke Isreal and to all the Lecturer in computer science department…

    • 5609 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    wireless sensors networks

    • 1540 Words
    • 7 Pages

    accurate over the long term, costs little to purchase and install, and requires no real…

    • 1540 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Intrusion Detection Software – features full-time monitoring tools that search for patterns in network traffic to identify intruders…

    • 839 Words
    • 4 Pages
    Satisfactory Essays