Online Submission!

Open Journal Systems

Wireless Anomaly Detection based on Hacker Behaviour Analysis

S.UVARAJ ARUTKUMARAN, Dr. G.A. SATHISH KUMAR

Abstract


This paper will look at the nature and structure of wireless sensor network attacks and the tools, actions and processes that can be used to identify and respond to such attacks. A brief overview examining the anatomy of an attack and the creation of botnets will be presented and the motivation that drives such on-line malicious activity, the type of tools that are used in modern attacks, which is behind these and the impact they have will be discussed. Identifying attack streams and understanding the nature of TCP/IP traffic will be discussed through the use of Wireshark and their operation and contribution to combating malicious network activity will be considered. As practical, hands-on exercises, participants will be able to simulate a network attack and response scenario by trying to penetrate a remote network while at the same time protecting their own network from attack. This will be done using the tools and techniques discussed earlier and by remotely accessing a real wireless sensor network (WSN) running in the NS-3 Simulator.

Full Text:

PDF

References


M. Mahoney and P. Chan, “PHAD: Packet header anomaly detection for identifying hostile network traffic”, Technical report, Florida Tech., technical report CS-2001-4, April

,http://citeseer.ist.psu.edu/mahoney01phad.ht ml

Mahoney M. and P. Chan, “Learning models of network traffic for detecting novel attacks", Technical report, Florida Tech 2012, http://cs.fit.edu/~mmahoney/paper5.pdf

D. Barbara, N. Wu and S. Jajodia, “Detecting Novel Network Intrusions using Bayes Estimators”, Proceedings of the 1st SIAM International Conference on Data Mining, 2013.

Jack Koziol, “Intrusion Detection with Snort”,

Pearson publications, 2013

R. Dan Reid & Nada R. Sanders, “Operations

Management”, 3rd edition., Wiley ,2012

P. Cisar, S. M Cisar, “Quality Control in Function of Statistical Anomaly Detection in Intrusion Detection Systems”, SISY 2012 - 4th Serbian- Hungarian Joint Symposium on Intelligent System.




DOI: http://dx.doi.org/10.6084/ijact.v0i0.564

Refbacks

  • There are currently no refbacks.




Copyright (c) 2016 An International Journal of Advanced Computer & Engineering Technology