BUILDING A FRAMEWORK FOR INTRUSION DETECTION AND PREVENTION IN IoT USING DATA ANALYTICS METHODS

Size: px
Start display at page:

Download "BUILDING A FRAMEWORK FOR INTRUSION DETECTION AND PREVENTION IN IoT USING DATA ANALYTICS METHODS"

Transcription

1 BUILDING A FRAMEWORK FOR INTRUSION DETECTION AND PREVENTION IN IoT USING DATA ANALYTICS METHODS RESEARCH PROPOSAL STUDENT NAME: Ahmad Arida STUDENT NUMBER: COURSE NAME: CIS 698 Independent Study DEPARTMENT: Department of Electrical Engineering and Computer Science COURSE CODE: 6405 SUPERVISOR: Dr. Sunnie S Chung DATE OF SUBMISSION: 01/23/2017

2 ABSTRACT With the rise of e-commerce and the Internet of Things (IoT), security of such systems over wireless networks is becoming more of a concern. Using the logs from the recently collected Aegean Wi-Fi Intrusion Dataset (AWID) dataset of highly characterized wireless network logs which contain real traces of both normal and intrusive traffic, we will identify and characterize suspicious and malicious activities over a wireless network. We will build a framework to identify and predict these events to prevent future intrusion attempts for intrusion detection. This research will explore the current state-of-the-art methodologies in data analytics literature for intrusion detection. For identification of outliers to characterize wireless intrusion attempts, we will apply a variety of data mining methods, including Bayesian analysis, nearest neighbour hierarchical clustering, and K-means clustering, to develop a more accurate outlier detection process. Gathering data from the logs about the characteristics about each intrusion will help build a set of rules for an algorithm to detect intrusion attempts. Finally, prevention and forecasting of intrusions will be implemented using SQL Server Analysis Services (SSAS) forecasting tools through the use of its business intelligence (BI) applications. This research will provide novel algorithms for use over wireless networks to detect and prevent intrusions. 2

3 INTRODUCTION BACKGROUND AND SIGNIFICANCE WIRELESS NETWORKS WIDESPREAD USE OF WIRELESS NETWORKING Over the past year, analysis and forecasting studies have predicted that the annual world-wide traffic online will have surpassed the zettabyte mark (1000 exabytes) by the end of 2016, and this traffic will continue to increase over the following 5 years three-fold 1. In addition, almost two-thirds of this traffic will be from wireless or mobile devices. With the majority of internet traffic occurring over wireless networks, the security of these information systems becomes increasingly more important. As this technology is relatively new, there are likely many gaps in the security of these networks that can be exploited through intrusion attempts. Therefore, wireless intrusion detection systems (IDS) are rapidly being developed in order to counter these potentially malicious behaviors. Importance of Wireless Network Security Medical devices and implants are an increasingly common use of wireless network technology 2. Use of such devices with internet access has a great benefit to the patient; however, ethical hackers have shown that they have been able to access insulin pumps and pacemakers, and could potentially switch them off and kill the patient. While there have not been any reported attacks to date on medical devices, the potential of these attacks could be devastating. Hospitals, firefighters, and the military also use wireless systems, and failure or malicious access of the systems could have far-ranging impacts 3. 1 K. Bode,Wireless traffic to reach 11.2 exabytes a month, Cisco, San Jose, CA, USA, [Online]. Available: C. Bates, Hackers can gain access to medical implants and endanger patients lives, < 3 Robert Mitchell, Ing-Ray Chen, A survey of intrusion detection in wireless network applications, Computer Communications, Volume 42, 1 April 2014, Pages 1-23, ISSN , (// 3

4 Standard The IEEE wireless standard is currently one of the most widely used wireless technologies in the world 4. Its popularity is predominantly driven by the high adoption rate of mobile devices (smartphones, tablets, laptops, etc.) combined with the convenience of portable communications. The network architecture of the IEEE family of wireless networks can be divided into two main groups: Infrastructure or Ad-Hoc. For the infrastructure mode, workstations can connect to an Access Point (AP) to connect to the network. In Ad-Hoc mode, the workstations can directly connect with each other. For the purposes of this research and available dataset, only the infrastructure mode will be discussed. Within the standard has three different frame categories for various purposes 5 : management, control, and data. In general, the management frames are used by the various workstations in order to join or leave the basic service. Control frames are heard by all of the workstations and assist with the delivery of the data frames, but contain only header information. Finally, data frames pass the actual data through the various layer protocols. The data frames have a consistent structure which includes a header, body of variable length up to 2312 bytes, and frame check sequence (FCS) 6. WEP Security In the late 1990s, the Wired Equivalent Privacy (WEP) was the sole security mechanism for the first iteration of the wireless standard 6. It was mainly introduced in order to bridge the gap between existing wired and wireless security and confidentiality 7. WEP uses a stream cipher to encrypt the data packets using a pre-shared key. However, this protocol is highly susceptible to many types of attacks which can crack these encryption keys given enough time. Even with this knowledge, there are currently still a large number of devices which utilize this technology. 4 Malik A, Qadir J, Ahmad B, Alvin Yau K, Ullah U. QoS in IEEE based wireless networks: A contemporary review. Journal Of Network & Computer Applications [serial online]. September 2015;55: N. Parsi,Wi-Fi every where, [Online]. Available: 6 Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Stefanos Gritzalis "Intrusion Detection in Networks: Empirical Evaluation of Threats and a Public Dataset" Communications Surveys & Tutorials, 2015 IEEE (Volume:PP, Issue:99). 7 Andrea Bittau, Mark Handley, and Joshua Lackey The Final Nail in WEP's Coffin. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (SP '06). IEEE Computer Society, Washington, DC, USA, DOI= 4

5 Types Of Attacks There are a number of different types of attacks against the wireless security protocols, including key retrieving attacks, keystream retrieving attacks, availability attacks, and man-in-themiddle attacks 6. As can be expected, key retrieving attacks focus on gaining access to the secret key. Because of the relatively weak security of WEP, all that an attacker needs is to monitor a network for specific packets and use a key cracking algorithm offline to decode the key. In this case, the process is passive and completely untraceable; however, the attacker may try to validate the key by sending packets across the network, which could reveal information about them. Even without the key, an attacker can still gain access through keystream retrieving attacks. These types of attacks leverage the initialization vectors for each packet, and the protocol does not forbid their reuse. Therefore, decrypting parts of a packet would potentially allow someone to create a keystream/initialization vector pair for all network traffic. Another type of attack that is commonly called a denial of service (DoS) attack interrupts the availability and service of a specific network. These types of attacks are fairly simple to implement in most of the wireless networks, up to n 8. However, the DoS attack needs to be maintained and the attacker needs to be present within the network (or range of the network) during the attack. Another type of attack is called the man-in-the-middle attack. This type of intrusion occurs when an attacker intercepts the communication between two parties who have the illusion that they are communicating directly with each other 9. The main goals of the attack are to bypass the mutual authentication when the attacker can successfully impersonate each endpoint. AWID Dataset The AWID dataset is refers to a collection of two equal datasets (AWID-CLS, AWID-ATK) depending on whether they are labelled according to the classification or the actual attacks. Each of these sets also contains both a full and reduced set, as a smaller subset would be easier to test 8 IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput, IEEE Std n-2009, Kreitz G. Flow stealing: A well-timed redirection attack. Journal Of Computer Security [serial online]. June 2013;21(3):

6 and develop research strategies. Also, each of the subsets have two versions as well- a training set and a test set for the purposes of model building (Figure 1) 6. Figure 1. AWID Subsets. Each row of the dataset is a vector of 156 attributes (155 attributes + 1 classification). This framework was designed to contain as many fields as possible. Intrusion Detection IDS systems are used as part of network security measures in order to prevent, detect, and/or tolerate intrusions depending on the circumstances 3. The first case is intrusion prevention, where a specific security measure can intervene and stop an attacker at the edge of a network without them gaining access. The next case is that of intrusion detection, which aims to identify, log, and track attackers who have penetrated the network. Finally, intrusion tolerance involves techniques to combat attackers and their methods. This is a highly evolving race where attackers and IDSs are continuously competing and developing better and more sophisticated methods. In general, there are some main standard metrics used in intrusion detection to measure performance: false positive (FP), false negative (FN), and detection 3. A FP occurs when a legitimate node or access attempt is incorrectly identified at an intrusion. A FN occurs when a malicious or illegitimate node or access attempt is incorrectly identified as legitimate. A detection occurs when a true intrusion attempt is detected and identified correctly. Detection Techniques 1. Anomaly Based Intrusion Detection Anomaly based intrusion detection is a method that raises an alarm when an observed behaviour exceeds a given threshold 10. In order for this detection system to function, significant resources need to be invested to estimate the normal boundaries of that network. Then, when a specific condition is violated, a specific set of instructions, usually including a logging event and an alarm, are generated. 10 García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security [serial online]. February 2009;28(1/2):

7 2. Signature Based Intrusion Detection Unlike anomaly detection, signature based intrusion detection is mainly used against specific classes of well-known classifications 10. This means that these algorithms are unable to detect any new or unfamiliar intrusions. This is mainly because a signature detection uses previously identified patterns and definitions to correctly mark a threat or attack. 3. Specification Based Intrusion Detection The specification based intrusion detection is somewhat of a hybrid of both anomaly and signature methods with input from a human expert 10. The data model is manually created with a set of rules which, if done to completion, will determine normal system behaviour and be able to reduce FP results. This is due to the expert able to include activities that were not previously reported in the model to not be reported as intrusions. Outlier Detection Methods 1. Bayesian networks A Bayesian networks is a graphical model which creates relationships between specific variables and can be used when dealing with uncertainty 11. This technique applied to intrusion detection in combination with statistical schemes can also grant the ability to predict events, based on prior knowledge of a human expert or using machine learning tools 10. A Naive Bayesian represents the simplest form of a Bayesian network, which uses a set of supervised learning algorithms combined with the naive assumption of having independence between the different sets. This methodology can be very effective in some situations, but the end results can be highly variable based upon the given assumptions of the behaviour of the specific system Clustering and Outlier Detection Cluster analysis is a technique in which a set of data is grouped such that the data in the same group, referred to as a cluster, is more similar to each other than to another cluster 12. Clustering analyses are utilized to group the observed dataset into defined clusters based upon specific variables of interest. As a first approximation, clustering analysis can be used to help researchers gather more information about a large dataset that would otherwise remain hidden within the bulk of the data. Briefly, a common first step involves determining a distance between each of the data points relative to a specific variable of interest 12, which is usually accomplished via computation of 11 Kenaza T, Tabia K, Benferhat S. On the Use of Naive Bayesian Classifiers for Detecting Elementary and Coordinated Attacks. Fundamenta Informaticae [serial online]. February 15, 2011;105(4): Antonenko P, Toy S, Niederhauser D. Using cluster analysis for data mining in educational technology research. Educational Technology Research & Development [serial online]. June 2012;60(3):

8 Euclidian distances 13. When the distances are known, an algorithm can be used to classify each data point into a specific cluster 14. The specific points that may not belong to any cluster are considered to be outliers, meaning that these objects are not similar to any of the defined clusters. This suggests that they could be anomalies, but are extremely useful for determining intrusion attempts Everitt, B. S., Landau, S., & Leese, M. (2009). Cluster analysis (4th ed.) London: Arnold. 14 Portnoy L., Eskin E., Stolfo S.J. Intrusion detection with unlabelled data using clustering. In: Proceedings of The ACM Workshop on Data Mining Applied to Security; Sequeira K., Zaki M. ADMIT: anomaly-based data mining for intrusions. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; p

9 OBJECTIVES AND AIMS Overall Objective The overall objective of this study is to use the AWID datasets to generate an algorithm that will be able to detect and prevent intrusion attempts over an wireless network. This is a relatively new dataset created in 2015 and will provide a novel basis for algorithms for an IDS system. Specific Aims 1. Identification of Outliers in the AWID Dataset 2. Classification of Features of Legitimate Intrusion Attempts 3. Creation of an Algorithm to Detect Intrusion Attempts 4. Refinement of Algorithm (or creation of additional algorithms) to Prevent Intrusions 9

10 RESEARCH DESIGN AND METHODS Brief Overview Using the AWID dataset, a set of data mining techniques, including Bayesian analysis, nearest neighbour hierarchical clustering, and K-means clustering, will be implemented to identify potential outliers in the data. These outliers can be further investigated in order to determine their legitimacy and classify them as intrusion attempts. Gathering data from the logs about the characteristics about each intrusion will help build a set of rules for an algorithm to detect intrusion attempts. Use of different training and test sets will further refine the algorithm. Finally, prevention and forecasting of intrusions will be attempted using SQL Server Analysis Services (SSAS) forecasting tools through the use of its business intelligence (BI) applications. Sources of Data The AWID dataset contains 4 different test sets and 4 different training sets (Figure 1). The training sets will be used initially in order to begin identifying outliers and for the initial generation of detection algorithm rules. Refinement of the algorithm will occur through the use of the test sets. The data samples have a size variation from approximately 1 million entries for the training set up to 38 million entries for the full testing set. Analysis Tools As this size of data cannot be opened with normal applications, special editors will be used to convert the data into usable formats for downstream applications. Tools such as EmEditor or EditPad have been able to open the full 38 million entry dataset containing 156 attributes. Depending upon the application, one of these two editors will be used for data saving and conversion. In order to quickly sample the data, the logs will be uploaded to Microsoft SQL Server into a flat table. This will allow quick querying over the data to determine ranges of values, as well as provide a means to quickly convert the data which is continuous into discrete bins through the use of custom views. These views will also allow export of the modified data into text files for use in other applications An additional use of Microsoft SQL Server will be the incorporation of multidimensional cubes through integration with Microsoft Visual Studio. This will allow further refinement of the dataset, as well as the ability to look at more than two dimensional data for common features. Many of the statistical processing methods will also occur through the use of SQL Server s business intelligence tools, including forecasting models. 10

11 Clustering analysis, including hierarchal clustering, as well as K-means analysis will be performed using the appropriate packages in R Studio. RStudio is an integrated development environment (IDE) for the R programming language. A major benefit of using R Studio is that it includes a an editor that supports direct code execution, as well as many statistical tools and packages designed for use in data analysis and statistics that can be readily adapted for data mining purposed. It is also an open source platform that can quickly analyse large datasets, which will be necessary when running analyses on 38 million rows of data. 11

12 REFERENCES 1) K. Bode,Wireless traffic to reach 11.2 exabytes a month, Cisco, San Jose, CA, USA, [Online]. Available: Exabytes-a-Month-By ) C. Bates, Hackers can gain access to medical implants and endanger patients lives, < 3) Robert Mitchell, Ing-Ray Chen, A survey of intrusion detection in wireless network applications, Computer Communications, Volume 42, 1 April 2014, Pages 1-23, ISSN , 4) Malik A, Qadir J, Ahmad B, Alvin Yau K, Ullah U. QoS in IEEE based wireless networks: A contemporary review. Journal Of Network & Computer Applications [serial online]. September 2015;55: ) N. Parsi,Wi-Fi every where, [Online]. Available: 6) Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Stefanos Gritzalis "Intrusion Detection in Networks: Empirical Evaluation of Threats and a Public Dataset" Communications Surveys & Tutorials, 2015 IEEE (Volume:PP, Issue:99). 7) Andrea Bittau, Mark Handley, and Joshua Lackey The Final Nail in WEP's Coffin. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (SP '06). IEEE Computer Society, Washington, DC, USA, DOI= 8) IEEE Standard for Information Technology Telecommunications and Information Exchange Between Systems Local and Metropolitan Area Networks Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput, IEEE Std n-2009, ) Kreitz G. Flow stealing: A well-timed redirection attack. Journal Of Computer Security [serial online]. June 2013;21(3): ) García-Teodoro P, Díaz-Verdejo J, Maciá-Fernández G, Vázquez E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security [serial online]. February 2009;28(1/2): ) Kenaza T, Tabia K, Benferhat S. On the Use of Naive Bayesian Classifiers for Detecting Elementary and Coordinated Attacks. Fundamenta Informaticae [serial online]. February 15, 2011;105(4):

13 12) Antonenko P, Toy S, Niederhauser D. Using cluster analysis for data mining in educational technology research. Educational Technology Research & Development [serial online]. June 2012;60(3): ) Everitt, B. S., Landau, S., & Leese, M. (2009). Cluster analysis (4th ed.) London: Arnold. 14) Portnoy L., Eskin E., Stolfo S.J. Intrusion detection with unlabelled data using clustering. In: Proceedings of The ACM Workshop on Data Mining Applied to Security; ) Sequeira K., Zaki M. ADMIT: anomaly-based data mining for intrusions. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; p

The Final Nail in WEP s Coffin

The Final Nail in WEP s Coffin 1/19 The Final Nail in WEP s Coffin Andrea Bittau 1 Mark Handley 1 Joshua Lackey 2 May 24, 2006 1 University College London. 2 Microsoft. Wired Equivalent Privacy 2/19 WEP is the 802.11 standard for encryption.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Analyzing Wireless Security in Columbia, Missouri

Analyzing Wireless Security in Columbia, Missouri Analyzing Wireless Security in Columbia, Missouri Matthew Chittum Clayton Harper John Mixon Johnathan Walton Abstract The current state of wireless security in most areas can be estimated based on trends

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Mechanisms for Database Intrusion Detection and Response. Michael Sintim - Koree SE 521 March 6, 2013.

Mechanisms for Database Intrusion Detection and Response. Michael Sintim - Koree SE 521 March 6, 2013. Mechanisms for Database Intrusion Detection and Response Michael Sintim - Koree SE 521 March 6, 2013. Article Title: Mechanisms for Database Intrusion Detection and Response Authors: Ashish Kamra, Elisa

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Intrusion Detection System using AI and Machine Learning Algorithm

Intrusion Detection System using AI and Machine Learning Algorithm Intrusion Detection System using AI and Machine Learning Algorithm Syam Akhil Repalle 1, Venkata Ratnam Kolluru 2 1 Student, Department of Electronics and Communication Engineering, Koneru Lakshmaiah Educational

More information

Empirical Study of Automatic Dataset Labelling

Empirical Study of Automatic Dataset Labelling Empirical Study of Automatic Dataset Labelling Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish School of Electronic, Electrical and System Engineering Loughborough University

More information

Cross Layer Detection of Wormhole In MANET Using FIS

Cross Layer Detection of Wormhole In MANET Using FIS Cross Layer Detection of Wormhole In MANET Using FIS P. Revathi, M. M. Sahana & Vydeki Dharmar Department of ECE, Easwari Engineering College, Chennai, India. E-mail : revathipancha@yahoo.com, sahanapandian@yahoo.com

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Secure Initial Access Authentication in WLAN

Secure Initial Access Authentication in WLAN International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1299-1303 International Research Publications House http://www. irphouse.com Secure Initial

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN 1 Review: Boosting Classifiers For Intrusion Detection Richa Rawat, Anurag Jain ABSTRACT Network and host intrusion detection systems monitor malicious activities and the management station is a technique

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection

A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection Int'l Conf. on Advances on Applied Cognitive Computing ACC'17 25 A Multi-agent Based Cognitive Approach to Unsupervised Feature Extraction and Classification for Network Intrusion Detection Kaiser Nahiyan,

More information

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED 01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED Contents 1. Introduction 3 2. Security Testing Methodologies 3 2.1 Internet Footprint Assessment 4 2.2 Infrastructure Assessments

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Detecting MAC Spoofing Using ForeScout CounterACT

Detecting MAC Spoofing Using ForeScout CounterACT Detecting MAC Spoofing Using ForeScout CounterACT Professional Services Library Introduction MAC address spoofing is used to impersonate legitimate devices, circumvent existing security mechanisms and

More information

Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks

Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks RESEARCH ARTICLE Performance of data mining algorithms in unauthorized intrusion detection systems in computer networks Hadi Ghadimkhani, Ali Habiboghli*, Rouhollah Mostafaei Department of Computer Science

More information

Detecting and Preventing Network Address Spoofing

Detecting and Preventing Network Address Spoofing Detecting and Preventing Network Address Spoofing Hamza A. Olwan 1, Mohammed A. Babiker 2 and Mohammed E. Hago 3 University of Khartoum, Sudan olwan777@gmail.com 1, moh_teg821@hotmail.com 2 and melzain88@gmail.com

More information

Detecting Botnets Using Cisco NetFlow Protocol

Detecting Botnets Using Cisco NetFlow Protocol Detecting Botnets Using Cisco NetFlow Protocol Royce Clarenz C. Ocampo 1, *, and Gregory G. Cu 2 1 Computer Technology Department, College of Computer Studies, De La Salle University, Manila 2 Software

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

Keywords Sosemanuk, VOIP, Android, Encryption, Descryption

Keywords Sosemanuk, VOIP, Android, Encryption, Descryption Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Decision Fusion using Dempster-Schaffer Theory

Decision Fusion using Dempster-Schaffer Theory Decision Fusion using Dempster-Schaffer Theory Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview Introduction

More information

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with L3 Forwarding on Wireless LANs Chibiao Liu and James Yu DePaul University School of CTI Chicago, IL {cliu1, jyu}@cs.depaul.edu Abstract This paper

More information

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes Thaksen J. Parvat USET G.G.S.Indratrastha University Dwarka, New Delhi 78 pthaksen.sit@sinhgad.edu Abstract Intrusion

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

Ju-A A Lee and Jae-Hyun Kim

Ju-A A Lee and Jae-Hyun Kim Ju-A A Lee and Jae-Hyun Kim Wireless Information & Network Engineering Research Lab, Korea {gaia, jkim}@ajou.ac.kr Abstract. IEEE 802.11i standard supports a secure access control for wireless LAN and

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

Intrusion Detection through Session Hijacking

Intrusion Detection through Session Hijacking Intrusion Detection through Session Hijacking Keshav Jain Chaudhary Devilal University, Sirsa, Haryana, Inida. Abstract:-The security of web applications has become increasingly important and a secure

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

A Survey And Comparative Analysis Of Data

A Survey And Comparative Analysis Of Data A Survey And Comparative Analysis Of Data Mining Techniques For Network Intrusion Detection Systems In Information Security, intrusion detection is the act of detecting actions that attempt to In 11th

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 6 Intrusion Detection First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Intruders significant issue hostile/unwanted

More information

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN ------------------- CHAPTER 4 DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN In this chapter, MAC layer based defense architecture for RoQ attacks in Wireless LAN

More information

PREEMPTIVE PREventivE Methodology and Tools to protect utilities

PREEMPTIVE PREventivE Methodology and Tools to protect utilities PREEMPTIVE PREventivE Methodology and Tools to protect utilities 2014 2017 1 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 Preemptive goal The main goal of PREEMPTIVE

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Chapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES

Chapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:

More information

Wireless Security Security problems in Wireless Networks

Wireless Security Security problems in Wireless Networks Wireless Security Security problems in Wireless Networks Security of Wireless Networks Wireless networks are everywhere more and more electronic devices are becoming wireless However, ensuring security

More information

Anomaly Detection in Communication Networks

Anomaly Detection in Communication Networks Anomaly Detection in Communication Networks Prof. D. J. Parish High Speed networks Group Department of Electronic and Electrical Engineering D.J.Parish@lboro.ac.uk Loughborough University Overview u u

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Dr. Nils

More information

Defending Denial of Service Attacks against Domain Name System with Machine Learning Techniques

Defending Denial of Service Attacks against Domain Name System with Machine Learning Techniques Defending Denial of Service Attacks against Domain Name System with Machine Learning Techniques Samaneh Rastegari, M. Iqbal Saripan* and Mohd Fadlee A. Rasid Abstract Along with the explosive growth of

More information

Internet Traffic Classification using Machine Learning

Internet Traffic Classification using Machine Learning Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Chapter 7 - Network Measurements Introduction Architecture & Mechanisms

More information

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003 Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not

More information

Intrusion Detection using NASA HTTP Logs AHMAD ARIDA DA CHEN

Intrusion Detection using NASA HTTP Logs AHMAD ARIDA DA CHEN Intrusion Detection using NASA HTTP Logs AHMAD ARIDA DA CHEN Presentation Overview - Background - Preprocessing - Data Mining Methods to Determine Outliers - Finding Outliers - Outlier Validation -Summary

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

A Passive Approach to Wireless NIC Identification

A Passive Approach to Wireless NIC Identification A Passive Approach to Wireless NIC Identification Cherita Corbett Georgia Institute of Technology IEEE ICC 2006 June 13, 2006 Presentation Outline Motivation & Background Objective NIC Identification using

More information

A Secure Wireless LAN Access Technique for Home Network

A Secure Wireless LAN Access Technique for Home Network A Secure Wireless LAN Access Technique for Home Network *Ju-A Lee, *Jae-Hyun Kim, **Jun-Hee Park, and **Kyung-Duk Moon *School of Electrical and Computer Engineering Ajou University, Suwon, Korea {gaia,

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set

Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Intrusion Detection System based on Support Vector Machine and BN-KDD Data Set Razieh Baradaran, Department of information technology, university of Qom, Qom, Iran R.baradaran@stu.qom.ac.ir Mahdieh HajiMohammadHosseini,

More information

Detecting Network Intrusions

Detecting Network Intrusions Detecting Network Intrusions Naveen Krishnamurthi, Kevin Miller Stanford University, Computer Science {naveenk1, kmiller4}@stanford.edu Abstract The purpose of this project is to create a predictive model

More information

Cryptanalysis. Ed Crowley

Cryptanalysis. Ed Crowley Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,

More information

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday) HW/Lab 4: IPSec and Wireless Security CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday) This HW/Lab assignment covers Lectures 8 (IPSec) and 10 (Wireless Security). Please review these

More information

INFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA

INFORMATION-THEORETIC OUTLIER DETECTION FOR LARGE-SCALE CATEGORICAL DATA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BYAENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2017 February 11(2): pages 14-18 Open Access Journal A Novel Framework

More information

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 INTRUSION DETECTION IN INTERNET OF THINGS A SURVEY T. S. Urmila, Dr. B. Balasubramanian

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

Overview of IEEE b Security

Overview of IEEE b Security Overview of IEEE 802.11b Security Sultan Weatherspoon, Network Communications Group, Intel Corporation Index words: 802.11b, wireless, WLAN, encryption, security ABSTRACT There is much regulatory and standards

More information

Raj Jain. Washington University in St. Louis

Raj Jain. Washington University in St. Louis Intrusion Detection Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Ajloun National University

Ajloun National University Study Plan Guide for the Bachelor Degree in Computer Information System First Year hr. 101101 Arabic Language Skills (1) 101099-01110 Introduction to Information Technology - - 01111 Programming Language

More information

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 NETWORK INTRUSION Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Recognize different

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin ARC VIEW DECEMBER 7, 2017 Critical Industries Need Active Defense and Intelligence-driven Cybersecurity By Sid Snitkin Keywords Industrial Cybersecurity, Risk Management, Threat Intelligence, Anomaly &

More information

Artificial Neural Network To Detect Know And Unknown DDOS Attack

Artificial Neural Network To Detect Know And Unknown DDOS Attack IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. II (Mar.-Apr. 2017), PP 56-61 www.iosrjournals.org Artificial Neural Network To Detect Know

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3 International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 2017 Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi

More information

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM

EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM EVALUATIONS OF THE EFFECTIVENESS OF ANOMALY BASED INTRUSION DETECTION SYSTEMS BASED ON AN ADAPTIVE KNN ALGORITHM Assosiate professor, PhD Evgeniya Nikolova, BFU Assosiate professor, PhD Veselina Jecheva,

More information

An Overview of Data Mining and Anomaly Intrusion Detection System using K-Means

An Overview of Data Mining and Anomaly Intrusion Detection System using K-Means An Overview of Data Mining and Anomaly Intrusion Detection System using K-Means S.Sujatha 1, P.Hemalatha 2,S.Devipriya 3 Assistant Professor, Department of Computer Science, Sri Akilandeswari Women s College,

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network

Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network Lynn Ray University of Maryland University College 3501 University Blvd East Adelphi, MD 20783. USA ABSTRACT: A neural

More information

Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach

Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach David Gitonga Mwathi * William Okello-Odongo Elisha Opiyo Department of Computer Science and ICT

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

A Technique for Improving Security in Mobile Ad-hoc Networks

A Technique for Improving Security in Mobile Ad-hoc Networks A Technique for Improving Security in Mobile Ad-hoc Networks By Ahmed Mahmoud Abdel Mo men A Master Thesis Submitted to the Faculty of Computers and Information Cairo University Information Technology

More information

Data science How to prepare engineers for this field

Data science How to prepare engineers for this field 16th Workshop Software Engineering Education and Reverse Engineering, Jahorina 2016 Data science How to prepare engineers for this field Ivica Marković Department of Computer Science Faculty of Electronic

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

Fuzzy Intrusion Detection

Fuzzy Intrusion Detection Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu

More information