Role of Cross Layer Based Intrusion Detection System for Wireless Domain

Abstract

Wireless mesh networks are very common both for organizations and individuals. Many laptops, computers have wireless cards pre-installed for buyer. However a wireless networking has many security issues. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. They detect attempts and active misuse either by legitimate users of the information systems or by external. The present paper deals with cross layer based intrusion detection system for wireless domain—a critical anlaysis. The present paper deals with role of cross layer based intrusion detection system for wireless domain.

Share and Cite:

R. Kaur, "Role of Cross Layer Based Intrusion Detection System for Wireless Domain," International Journal of Communications, Network and System Sciences, Vol. 5 No. 2, 2012, pp. 81-85. doi: 10.4236/ijcns.2012.52010.

1. Introduction

A Wireless Local Area Network (WLAN) is a flexible data communications system implemented as an extension to or as an alternative for, a wired LAN. Using radio frequency (RF) technology, wireless LANs transmit and receive data over the air, minimizing the need for wired connections. Wireless LANs frequently augment rather than replace wired LAN networks often providing the final few meters of connectivity between a wired network and the mobile user.

At its simplest form, wireless LAN technology, lets computers to communicate with the rest of a local area network via radio signals rather than over wires. There are two key components. First is the access point, or AP, which is the last wired stop on your network. Connected to the rest of the network via Ethernet cable, the AP translates the wired network traffic into radio signals and transmits it out. The signals are picked up by laptops or desktops with either removable or permanently embedded wireless-network interface cards. Figure 1 shows architecture of wireless LAN and Figure 2 shows functioning of wireless LAN.

Figure 1. Architecture of wireless LAN.

1.1. Need of Wireless Network Security

The fundamentals of wireless security are largely similar to those of the wired Internet, wireless data networks present a more constrained communication environment compared to wired networks. Because of fundamental limitations of power, available spectrum and mobility, wireless data networks tend to have less bandwidth, more latency, less connection stability, and less predictable availability. Similarly, handheld wireless devices tend to have limited battery life, less powerful CPUs, restricted power consumption, smaller displays, and different input presenting a more constrained computing environment compared to desktop computers.

With a WLAN, transmitted data is broadcast over the air using radio waves. This means that any WLAN client within an access point (AP) service area can receive data transmitted to or from the access point. Because radio waves travel through ceilings, floors, and walls data may hence easily reach unintended recipients. Tools like Ethereal; AirSnort can easily be used to passively collect data of any Client within the broadcast range. Users have no way of knowing if they are connecting to rogue access point set-up as part of a man-in-the-middle attack.

WLAN security, involves concern in three separate issues:

· Authentication.

· User Privacy.

· Authorization.

Figure 3 shows the wireless security issues and Figure 4

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] B. Mukherjee, L. T. Heberlein and K. N. Levitt, “Network Intrusion Dtetction,” Ieee Network, May-June 1994, pp. 8-10.
[2] D. Dasgupta, et al. “Cougaar Based Intrusion Detection System (Cids),” Cs Technical Report, No. Cs-02-001, 4 February 2002.
[3] H. Debar, M. Dacier and A. Wespi, “Towards a Taxonomy of Intrusion-Detection Systems,” Computer Networks, Vol. 31, No. 8, 1999, pp. 805-822. doi:10.1016/S1389-1286(98)00017-6
[4] D. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. 13, No. 2, 1987, pp. 222-232.
[5] G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad Hoc Networks,” IEEE International Conference on Mobile Adhoc and Sensor Systems, Washington, DC, 7 November 2005, p. 861. doi:10.1109/MAHSS.2005.1542882
[6] J. Hall, “Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting,” IEEE Transactions on Dependable And Secure Computing, 12 July 2005, pp. 18-22.
[7] Y. Lim, T. Schmoyer, J. Levine and H. L. Owen. “Wireless Intrusion Detection and Response,” Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, New York, June 2003, pp. 22-26.
[8] Y. Zhang, and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, 6-11 August 2000, pp. 26-31.
[9] X. Wang, J. S. Wong, F. Stanley and S. Basu “Cross-Layer Based Anomaly Detection in Wireless Mesh Networks,” Ninth Annual International Symposium on Applications and the Internet, Bellevue, 20-24 July 2009, pp. 9-15.
[10] J. S. Bal, et al., “A Cross Layer Based Intrusion Detection Technique for Wireless Network,” International Journal of Computer Science & Information Security, Vol. 5, No. 25080924, 2009.
[11] S. Rakesh, “A Novel Cross Layer Intrusion Detection System in MANET,” 24th Proceedings of IEEE International Conference on Advanced Information Networking and Applications, Perth, 20-23 April 2010, pp. 38-48.
[12] S. Madhavi, “An Intrusion Detection System in Mobile Adhoc Networks,” International Journal of Security and Its Applications, Vol. 2, No.3, 2008, pp. 11-17.
[13] S. Khan. “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks”, The International Arab Journal of Information Technology, Vol. 7, No. 4, 2010, pp. 50-55.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.