Skip to content
2000
Volume 14, Issue 1
  • ISSN: 2666-2558
  • E-ISSN: 2666-2566

Abstract

Background: Intrusion Detection System (IDS) is a Software application which gives the facility to monitor the traffic of network, event or activities on network and finds out any malicious operation if present. Objective: In this paper, a new protocol was developed that can detect the Wireless Network Attack based on the reference of TCP/IP Model. In the proposed system the new feature is integrated in the IDS which are built in the router itself. Methods: If any intruder tries to connect with router, intruder has to authenticate himself/herself. To find the authentication key the intruder attacks on the router to matches the authentication key with the key which he/she has. The intruder has a file with the multiple different keys in it and with that file intruder applies a brute-force attack on the router, the brute-force checks every key of the file by applying them on the router when a key matches with the authenticated key the brute-force software inform the intruder about the key matching. The IDS of the router will checks the rapid tries arriving from the same MAC address, if any MAC address tries the false key many of time than the IDS will identify the MAC as intruder and inform the system administrator about the intrusion by popping up a message on the system of the administrator. Results: Simulation of the two different scenarios is done by using the Network simulator (NS 2) and NAM (Network animator). In scenario 1 the node 1 is intruder and the IDS protocols have figure it out. The intruder is labeled as 2. In scenario 2 node 1 is the sentinel node and it gets connected to router after authentication. Conclusion: The mechanism can detect a false node in the network which is major threat in WSNs. Result has been evaluated the performance of IDS protocol by using Ad-hoc On Demand Distance Vector (AODV) Routing Protocol for routing.

Loading

Article metrics loading...

/content/journals/rascs/10.2174/2213275912666181207154754
2021-01-01
2024-11-08
Loading full text...

Full text loading...

/content/journals/rascs/10.2174/2213275912666181207154754
Loading


  • Article Type:
    Research Article
Keyword(s): attack; Intrusion detection; ns-2; packet; security; TCP/IP; WLAN
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test