TAILIEUCHUNG - Agent based intrusion detection technique for wireless network
An intrusion detection system (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. (IDS), as a new defensive-security layer to the WSNs' security infrastructure; which it can detects unsafe activities and unauthorized access. | ISSN:2249-5789 Namita Singh et al , International Journal of Computer Science & Communication Networks,Vol 4(3),53-57 Agent Based Intrusion Detection Technique for Wireless Network Namita Singh uday kumar singh Computer Science & Engineering Department , LUCKNOW namitasingh02@ Abstract An intrusion detection system (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. (IDS), as a new defensive-security layer to the WSNs' security infrastructure; which it can detects unsafe activities and unauthorized access; also, when attacks occurred, even new attacks such as anomalies, it can notify by different warnings and perform some actions (mainly predefined actions). Therefore, the main purpose of this paper is discussing and solving the intrusion detection over a wireless network. 1. Introduction Intrusion, . unauthorized access or login signing in and gaining access to a network server, Web server or other computer system. The process (the noun) is a "login" or "logon," while the act of doing it (the verb) is to "log in" or to "log on. (To the system, or the network or other resources); Intrusion is a set of actions from internal or external of the network, which violate security aspects (including integrity, confidentiality, availability and authenticity) of a network's resource. Intrusion detection is a process which detecting contradictory activities with security policies to unauthorized access or performance reduction of a system or network; the purpose of intrusion detection process is reviewing, controlling, analysing and representing reports from the system and network activities. Intrusion Detection System (IDS) [1][2], .: • A hardware or software or combinational system, with aggressivedefensive approach to protect information, systems and networks; • Usable on host, network and application levels; • For analysing traffic, controlling communications and ports, detecting attacks and occurrence
đang nạp các trang xem trước