Advances in Intrusion Detection System for WLAN
Ravneet Kaur
DOI: 10.4236/ait.2011.13007   PDF    HTML     6,063 Downloads   14,909 Views   Citations


A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.

Share and Cite:

R. Kaur, "Advances in Intrusion Detection System for WLAN," Advances in Internet of Things, Vol. 1 No. 3, 2011, pp. 51-54. doi: 10.4236/ait.2011.13007.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] B. Mukherjee, L. T. Heberlein and K. N. Levitt, “Network Intrusion Detection,” IEEE Network, Vol. 8, No. 3, 1994, pp. 8-10.doi:10.1109/65.283931
[2] D. Dasgupta, et al., “Cougar Based Intrusion Detection System (Cids),” Cs Technical Report No. Cs-02-001, 4 February 2002.
[3] H. Debar, M. Dacier and A. Wespi, “Towards a Taxonomy of Intrusion-Detection Systems,” Computer Networks, Vol. 31, No. 8, 1999, pp. 805-822. doi:10.1016/S1389-1286(98)00017-6
[4] D. Denning, “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering, Vol. Se-13, No. 2, 1987, pp. 222-232.
[5] G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad Hoc Networks,” Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005, p. 861. doi:10.1109/MAHSS.2005.1542882
[6] J. Hall, “Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting,” IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 3, 2005, pp. 18-22.
[7] Y. Lim, T. Schmoyer, J. Levine and H. L. Owen. “Wireless Intrusion Detection and Response.” Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, 18-20 June 2003, pp. 22-26.
[8] S. Rakesh, “A Novel Cross Layer Intrusion Detection System in MANET,” Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications, 2010, pp. 38-48.
[9] S. Madhavi, “An Intrusion Detection System in Mobile Adhoc Networks,” International Journal of Security and Its Applications, Vol. 2, No. 3, 2008, pp 11-17.
[10] K. Shafiullah, “Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks,” The International Arab Journal of Information Technology, Vol. 7, No. 4, 2010, pp. 50-55.
[11] Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Network,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, 6-11 August 2000, pp. 26-31. doi:10.1145/345910.345958
[12] W. Xia, J. S. Wong, F. Stanley and S. Basu, “Cross-Layer Based Anomaly Detection in Wireless Mesh Networks,” 9th Annual International Symposium on Applications and the Internet, Bellevue, 20-24 July 2009, pp. 9-15.
[13] J. S. Bal, et al., “A Cross Layer Based Intrusion Detection Technique for Wireless Network,” International Journal of Computer Science and Information Security, Vol. 5, September 2009, Article ID: 25080924.
[14] R. Kaur, “Study of Intrusion Detection Systems for Wireless Networks,” International Journal of Wireless Networks and Communication, Vol. 13, 2011,In Press.
[15] R. Kaur, “Cross Layer Based Intrusion Detection System for Wireless Domain-Acritical Analysis,” International Journal of Computer Science and Communication, Vol. 2, No. 2 (Accepted for publication), 2011.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.