Commenced in January 2007
Paper Count: 30848
Key Issues and Challenges of Intrusion Detection and Prevention System: Developing Proactive Protection in Wireless Network Environment
Abstract:Nowadays wireless technology plays an important role in public and personal communication. However, the growth of wireless networking has confused the traditional boundaries between trusted and untrusted networks. Wireless networks are subject to a variety of threats and attacks at present. An attacker has the ability to listen to all network traffic which becoming a potential intrusion. Intrusion of any kind may lead to a chaotic condition. In addition, improperly configured access points also contribute the risk to wireless network. To overcome this issue, a security solution that includes an intrusion detection and prevention system need to be implemented. In this paper, first the security drawbacks of wireless network will be analyzed then investigate the characteristics and also the limitations on current wireless intrusion detection and prevention system. Finally, the requirement of next wireless intrusion prevention system will be identified including some key issues which should be focused on in the future to overcomes those limitations.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1056448Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3396
 Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava, "INTRUSION DETECTION: A SURVEY", Managing Cyber Threats: Issues, Approaches and Challenges, Vol. 5, 2005, Springer Publisher.
 Alina Olteanu and Yang Xiao, "Security Overhead and Performance for Aggregation with Fragment Retransmission (AFR) in Very High-Speed Wireless 802.11 LANs", IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 1, JANUARY 2010
 Alvaro A.Cardenas, "A Framework for the Evaluation of Intrusion Detection Systems", IEEE Symposium on Security and Privacy, 2006
 Carl Endorf, "Intrusion Detection and Prevention", McGraw- Hill/Osborne, 2004
 Dong Lijun, Yu Shengsheng, Xia Tao, Liao Rongtao. "WBIPS: A Lightweight WTLS-Based Intrusion Prevention Scheme", In Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, IEEE Press, Sept. 2007, pp. 2298-2301.
 Earle, A.E., "Wireless Security Handbook", Auerbach Publications Taylor & Francis Group, New York, 2006
 Fernandez, E.B., Jawhar, I.. Petrrie. VanHilst, M., "An overview of the security wireless network", http://csrc. nist.gov/publications/ nistpubs/80048/NIST_SP_800-48.pdf, 2004
 Gast, Matthew, "802.11Wireless Networks: The Definitive Guide", Sebastopol,CA: O'Reilly, 2005
 Gunter Schafer, "Security in Fixed and Wireless Networks: an Introduction to Securing Data Communications", Wiley, 2003
 Guanlin Chen1, Hui Yao, Zebing Wang, "An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition", Second International Conference on Future Networks, 2010
 Guanlin Chen, Hui Yao, Zebing Wang, "Research of Wireless Intrusion Prevention Systems based on Plan Recognition and Honeypot", In Proceedings of the International Conference on Wireless Communications & Signal Processing, IEEE Computer Society, Nov. 2009 Jack TIMOFTE, "Wireless Intrusion Prevention System", Revista Informatica Economica, vol. 47, March 2008
 Lane, Heater D.. Securities Vulnerabilities and Wireless LAN Technology. SANS Institute, Virginia Beach 2006.
 Lynn Michael T., Hrastar Scott, "Method and system for actively defending a wireless LAN against attacks", United States Patent Application 20030233567, Jun. 2002
 Manivannan, N. dan Neelameham, P., 2006, "Wireless Security Techniques", Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2006 No.2(9)
 Paul Bedell, "Wireless Crash Course", 2nd Edition, McGraw-Hill, 2005
 Paul DeBeasi, "802.11n: The End of Ethernet?", Network and Telecom Strategies In-Depth Research Report, Burton Group Sep 14, 2009
 Timothy D. Wickham, "Intrusion detection is dead. Long live prevention!"http://www.sans.org/readingJoom/whitepapers/detection/ 1028.php, 2003.
 Timothy R.Schmoyer, "Wireless Intrusion Detection and Response: A Case Study using the Classic Man-in-the-Middle-Attack", IEEE Communication Society, 2004
 Tung, S.S, Ahmad, N.N., Geok, T.K., 2006, "Wireless LAN Security: Securing Your Access point", IJCSNS International Journal of Computer Science and Network Security", VOL.6 No.5B, May 2006
 V. Vartak, S. Ahmad, K N Gopinath. "An Experimental Evaluation of Over-The-Air (OTA) Wireless Intrusion Prevention Techniques", In Proceedings of the 2nd International Conference on Communication Systems Software and Middleware, IEEE Computer Society, Jan. 2007, pp. 1-7.
 Vladimirov, Andrew A., Konstantin V. Gavrilenko, and Andrei A. Mikhailovsky. "Wi-Foo: The Secrets of Wireless Hacking", Boston: Addison-Wesley, (2004)
 Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, and Li-Tsung Huang, 'The implementation of a proactive wireless intrusion detection system", In Proceedings of the Fourth International Conference on Computer and Information Technology, IEEE Press, Sept. 2004, pp. 581-586.
 Wu Junqi, "Study of Intrusion Detection System (IDSs) in Network Security", IEEE Wireless Communication, 2008
 Yujia Zhang, Guanlin Chen*, Wenyong Weng, Zebing Wang, "An Overview of Wireless Intrusion Prevention Systems", 2010 Second International Conference on Communication Systems, Networks and Applications
 Yaqing Zhang, Srinivas Sampalli, "Networking and Communications Client-based Intrusion Prevention System for 802.11 Wireless LANs", 2010 IEEE 6th Intemational Conference on Wireless and Mobile Computing.