Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

نویسندگان

  • M. Ghassemian School of Computing and Mathematical Sciences, University of Greenwich
  • O. Adaobi School of Computing and Mathematical Sciences, University of Greenwich
چکیده مقاله:

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus simulated an IDS that usesanomaly-based technique to monitor traffic pattern on thenetwork following a fixed-width clustering algorithm. Oursimulation is based on the sensor network simulationpackage by the Naval Research laboratory (NRL). Toevaluate the IDS, we simulated a sensor network,investigated it with the presence of phenomenon, andextended it to generate denial of service attacks. We haveused the phenomenon contribution to generate a realistictraffic pattern for accurate evaluation of protocols, andcompared it to the traditional method of using only cbrtraffic, which is usually been employed by mostresearchers. We further adapted the IDS into this simulatednetwork, and our results show that the selected IDS hasdetection rate of over 90% with a very low false positiverate of less than 1%. We obtained this by configuring everynode to independently monitor detect and report intrusions.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

evaluation of an intrusion detection system for routing attacks in wireless self-organised networks

wireless sensor networks (wsns) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. however,security is a major challenge for wsns because they areusually setup in unprotected environments. our goal in thisstudy is to simulate an intrusion detection system (ids)that monitors the wsn and report intrusions accurately andeffectively. we have thus...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Intrusion Detection for Routing Attacks in Sensor Networks

Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central base station. In this paper, we present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behaviour, and then uses...

متن کامل

An Efficient Intrusion Detection System for Networks with Centralized Routing

As Internet becomes more and more ubiquitous, security is an increasingly important topic. Furthermore, private networks are expanding and security threats from within the network have to be cautioned. For these large networks, which are generally high-speed and with several segments, Intrusion Detection System (IDS) placement usually comes down to a compromise between investment and monitoring...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 1  شماره 1

صفحات  16- 20

تاریخ انتشار 2011-09-20

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023