Redundancy Management and Host Intrusion Detection in WSN

Redundancy Management and Host Intrusion Detection in WSN

Vijander Singh, Ramesh C. Poonia, Linesh Raja, Gourav Sharma, Narendra Kumar Trivedi, Gaurav Narayan Mathur
DOI: 10.4018/978-1-5225-9554-0.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Intrusion detection system (IDS) is a software application that gives the facility to monitor the traffic of network, event, or activities on networks and finds if any malicious operation occurs. Hackers use different types of attacks to capture the information and use brute force attacks to match the authenticated key with the key, which the hacker has in its stable. When there is a match, the hacker gets the authenticated key through which he can connect with the hotspot or AP. IDS finds invalid or any other misbehavior in the system. The protocol will take care of it; protocol checks the MAC address of the device which wishes to connect with the hotspot or AP, and if any device repeatedly enters a wrong password, the protocol will gives a pop up on the administrator system. The objective of this chapter is to provide information about the protocol that behaves like IDS and is pre-implemented in the routers, which gives the alert to the administrator if any intruder tries to connect with the hotspot or AP (access point) with the rapid wrong key.
Chapter Preview
Top

Introduction

The Mobile Ad-hoc Networks (MANETs) involved in the development of various applications. Due to its high mobility, maintaining security is a big challenge. Now a day’s hacker uses different types of attacks to capture the information and uses the brute force attack to match the authenticated key with the key which hacker has in its table, when there is a match the hacker get authenticated key through which he can connect with the hotspot or AP. IDS find the invalid or any other misbehave in system. The protocol will take care of it; protocol checks the MAC address of the device which wishes to connect with the Hotspot or AP and if any device repeatedly enters a wrong password then protocol will gives a pop up on the administrator system. The prevention method is not sufficient to ensure security against the attackers. There is a requirement of adding another security level. This can be achieved by the help of detection level. The uses of Intrusion Detection System (IDS) which are widely used by the traditional communication networks are not compatible for MANETs. So there is a need to develop the intrusion detection system which suits the MANETs. This chapter provides the information regarding the same.

Wireless Network has reached to its greater extend from the small area connection like Wireless LAN (WLAN) to its extending up to Satellite Communication. The Wireless Area Network has overcome the Wired Connection because of its cheaper cost, Easy Start-up and Simpler process. There are several issues arise when it require solution related to proper management and maintenance. Wireless Network is always vulnerable and in this cyber world everyone wants to maintain their network secure, free from any kind of malicious attack and wireless attack. The cost of hardware and data stored on the connected networks are another cause behind the security, management and maintenance.

Background

This chapter explore about maintain the wireless network and keep free from any kind of intrusion activity and maintain a minimum vulnerable network from any attempt for Illegal entry using various wireless attack resembling brute force attack, dictionary attack and man-in-the-middle attack.

There are more than 15 types of attacks on the Wireless Network and every attack has different parameters according to their effects on the network, the main objective and motive to start this project is the existing systematic solution to the threats that all the algorithm uses only the detection system that is Intrusion Detection System (IDS) but for the better Network performance and for better tomorrow the network itself should be smarter to perform Intrusion Response System (IRS). IDS is implemented separately or it is used with the firewall or anti-virus, but in the scenario it is mandatory to purchase the IDS or IPS separately.

An overview of design principles of intrusion tolerant architecture is provided in the paper (Fraga, J., & Powell, D. 1985). Intrusion Tolerance as a body of knowledge, and a little longer, is the main catalyst for the security sector's evolution. According to the “malicious intelligence” perspective, when analyzing errors, they have brought serious problems, such as uncertainty, adaptation, incomplete knowledge, interference, etc. In this regard, the researchers sought new answers, sometimes with new names or small reliability hints such as reliability or survival.

Inayat, Z. et. al. have presented the motivation for the design of intrusive response systems (IRS) for distributed systems.. The researchers have given the design challenges for the implementation of IRS. They were classified into following classes:

  • Static Design: It deals with static mapping of the detector alert to the response which is to be deployed.

  • Dynamic Decision: It makes a continuous attack based on the alerts observed and determines the appropriate response to take.

  • Intrusion Tolerance: It performs security critical functions by providing masking of security failures through the use of diverse replicas concurrently.

  • IRS: It targets specific types of attacks, with the attention of denial of service attacks (DDoS).

Author presented five key areas in which IRS have to evolve for widespread adoption. The design and development of the IRS has been gaining in the attention of the research and is expected to become the mainstream of the landscape of computer security in the near future (Inyat, Z. et. al., 2016).

Complete Chapter List

Search this Book:
Reset