A Survey on Intrusion Detection in Wired and Wireless Network for Future IoT Deployment

A Survey on Intrusion Detection in Wired and Wireless Network for Future IoT Deployment

Vasaki Ponnusamy, Said Bakhshad, Bobby Sharma, Robithoh Annur, Teh Boon Seong
DOI: 10.4018/978-1-7998-2803-7.ch007
(Individual Chapters)
No Current Special Offers


An intrusion detection system (IDS) works as an alarm mechanism for computer systems. It detects any malicious activity that happened to the computer system and it alerts an alarm message to notify the user there is malicious activity. There are IDS that are able to take action when malicious or anomalous networks are detected, which include suspending the traffic sent from suspicious IP addresses. The problem statement for this project is to find out the most accurate machine learning algorithm and the types of IDS with different placement strategies. When it comes to the deployment of a wireless network, IDS is not as easy a task as deploying a traditional network IDS. There are many unexpected complexities of the problem of reliable intrusion detection in a wireless network. The motivation of this research is to find the most suitable classification techniques that are able to increase the accuracy of an IDS. Machine learning is useful for the upcoming trend; it provides better accuracy in the detection of malicious traffic.
Chapter Preview

Survey On Intrusion Detection

Figure 1.

Focus of Intrusion Detection System

Figure 2.

Target Network


Wired Network

A wired network consists of a group of computers or devices connected via physical network links, with the objective of data transmission between computers or devices using optical cables or transmission medium or to share resources. Wired network are less exposed to attack as compared to wireless network due to physical access to network via the required hardware being needed to access the data transmitted, which makes wired network comparatively more secure to wireless network. However, it cannot be claimed impervious to attacks absolutely, as malevolent users with legitimate access to the network and data may pose a risk from within. Being advantageous in speed, the cost is primarily ascertained by the network element features, such as number of computers and cable requirements, making wired networks cheaper and more affordable rather than using wireless network. Additionally, interference to the wireless network may cause signal loss or fading (Radja, 2015). That being said, wired networks are vulnerable to causing system-wide collapse in event of partial network immobility, as witnessed in the coal production safety being affected due to wired network failure. (Zhang & Mao 2015).

Complete Chapter List

Search this Book: