Role of Cross Layer Based Intrusion Detection System for Wireless Domain


Wireless mesh networks are very common both for organizations and individuals. Many laptops, computers have wireless cards pre-installed for buyer. However a wireless networking has many security issues. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. They detect attempts and active misuse either by legitimate users of the information systems or by external. The present paper deals with cross layer based intrusion detection system for wireless domain—a critical anlaysis. The present paper deals with role of cross layer based intrusion detection system for wireless domain.

Share and Cite:

R. Kaur, "Role of Cross Layer Based Intrusion Detection System for Wireless Domain," International Journal of Communications, Network and System Sciences, Vol. 5 No. 2, 2012, pp. 81-85. doi: 10.4236/ijcns.2012.52010.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] B. Mukherjee, L. T. Heberlein and K. N. Levitt, “Network Intrusion Dtetction,” Ieee Network, May-June 1994, pp. 8-10.
[2] D. Dasgupta, et al. “Cougaar Based Intrusion Detection System (Cids),” Cs Technical Report, No. Cs-02-001, 4 February 2002.
[3] H. Debar, M. Dacier and A. Wespi, “Towards a Taxonomy of Intrusion-Detection Systems,” Computer Networks, Vol. 31, No. 8, 1999, pp. 805-822. doi:10.1016/S1389-1286(98)00017-6
[4] D. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. 13, No. 2, 1987, pp. 222-232.
[5] G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad Hoc Networks,” IEEE International Conference on Mobile Adhoc and Sensor Systems, Washington, DC, 7 November 2005, p. 861. doi:10.1109/MAHSS.2005.1542882
[6] J. Hall, “Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting,” IEEE Transactions on Dependable And Secure Computing, 12 July 2005, pp. 18-22.
[7] Y. Lim, T. Schmoyer, J. Levine and H. L. Owen. “Wireless Intrusion Detection and Response,” Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, New York, June 2003, pp. 22-26.
[8] Y. Zhang, and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, Boston, 6-11 August 2000, pp. 26-31.
[9] X. Wang, J. S. Wong, F. Stanley and S. Basu “Cross-Layer Based Anomaly Detection in Wireless Mesh Networks,” Ninth Annual International Symposium on Applications and the Internet, Bellevue, 20-24 July 2009, pp. 9-15.
[10] J. S. Bal, et al., “A Cross Layer Based Intrusion Detection Technique for Wireless Network,” International Journal of Computer Science & Information Security, Vol. 5, No. 25080924, 2009.
[11] S. Rakesh, “A Novel Cross Layer Intrusion Detection System in MANET,” 24th Proceedings of IEEE International Conference on Advanced Information Networking and Applications, Perth, 20-23 April 2010, pp. 38-48.
[12] S. Madhavi, “An Intrusion Detection System in Mobile Adhoc Networks,” International Journal of Security and Its Applications, Vol. 2, No.3, 2008, pp. 11-17.
[13] S. Khan. “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks”, The International Arab Journal of Information Technology, Vol. 7, No. 4, 2010, pp. 50-55.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.