Cross-Layer Based Intrusion Detection and Prevention for Network

Cross-Layer Based Intrusion Detection and Prevention for Network

Reema Kumari, Kavita Sharma
Copyright: © 2018 |Pages: 19
DOI: 10.4018/978-1-5225-4100-4.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Day by day technologies for mobile computing growing rapidly and its network security changed according to their need. The attacker always trying to learn some new techniques to break those security walls of the wireless network. To prevent our network from attacker various defense techniques are used. Firewalls and encryption are used to prevent our network from malware but it is not sufficient for protecting the networks. Many researchers implement new architecture and techniques or mechanism that protect and detect malicious node and their activity over the network that is intrusion detection system (IDS). IDS provides security wall and it provides network security as well as it has continuously monitored and taken appropriate action against the threat. In this Chapter, we are trying to explain some network attack that is resolved or detect through intrusion detection system by exploiting the technology or information that available across different layers of the protocol stack in order to improve the accuracy of detection.
Chapter Preview
Top

Introduction

Cross layer-based intrusion, detection system utilizes information across the layers; it effectively identifies intrusion over the network. Before detecting malicious node on the network, first, it performs multi-level detection on multiple layers. The main objective of adopting cross-layer design is, 1) Detecting attack at multi-level of the protocol layer; 2) Exploiting information so that energy and congestion; and 3) It detects intrusion more accurately on multiple layers.

  • 1.

    Detecting Intrusion: It detects intrusion on two levels that is level-1 detection and level-2 detection. The two levels are using two methods i.e.

    • a.

      CIDS-1: Information is obtained through detecting DoS attacks at one layer and it is shared on another layer.

    • b.

      CIDS-2: In this attack, multiple detections of a DoS is detected on the same layer.

  • 2.

    CIDS (Cross-Layer Based Intrusion Detection)-1: It is level-1 detection method. It detects malicious node from different layers. In addition, level 2 detects truly malicious nodes in the network.

  • 3.

    CIDS (Cross-Layer Based Intrusion Detection)-2: It is the second method for detection; 2-level detection occurs at the same layer. It is similar to the first method. In level-1 detection, only passive monitoring is done but in level-2 detection, detection is applied on the same layer (Thamilarasu, Balasumbramanian, Mishra, & Sridhar, 2005).

Complete Chapter List

Search this Book:
Reset