Please use this identifier to cite or link to this item:
Title: Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN)
Researcher: Singh, Jatinder
Guide(s): Kaur, Lakhwinder
Gupta, Savita
Keywords: WLAN
Computer Engineering
Intrusion Detection Techniques
Wireless Local Area Network (WLAN)
Intrusion Detection
Wormhole attack
Upload Date: 24-Apr-2012
University: Punjabi University
Completed Date: April, 2011
Abstract: Wireless local area networks (wireless LANs, or WLANs) are changing the landscape of computer networking. In recent years, the proliferation of wireless devices coupled with the demand for continual network connections without having to "plug in," are resulting in an explosive growth in enterprise WLANs. Wireless networks offer the benefits of increased productivity, easier network expansion, flexibility, and lower the cost of ownership. In addition Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Following the increasing demand for wireless data access, different kind of wireless communication technologies are being developed continually. On the other hand, Wireless LAN standards offer very unsatisfactory level of security and one could not truly trust them. Some commonly used attacks are more strained in wireless environment and some additional effort should be used to prevent those. The nature of the radio communication makes it practically impossible to prevent some attacks. In the literature number of techniques had been developed to address different types of attacks, but the effective detection of especially the Session hijacking, Man-in-the-middle, Denial of Services; Distributed Denial of Services and Shrew attacks are remain open challenges. The research work seeks to investigate the design of effective intrusion detection techniques in the WLAN. The research work embrace with the comprehensive review of; (i) the outstanding vulnerabilities and attacks in WLAN, (ii) the wireless intrusion detection techniques, and (iii) the intrusion detection tools to analyze their performance and enhancements for WLAN. This study provides the suggestive guidelines on the selection and design of Intrusion Detection Techniques for WLAN. In the research work, three new robust, efficient intrusion detection techniques (namely Cross Layer Based, MAC Layer Based and Distributed techniques) have been proposed that attains low misdetection ratio and false positive rate while increasing the packet delivery ratio. Further, we have developed an algorithm to automatically assign priority to the detected attack by cross layer detection technique using MAC layer based defense architecture. The performance of all these techniques has been evaluated in NS2 tool on the Fedora platform. First, A MAC Layer Based defense scheme is developed for Reduction-of-Quality (RoQ) attacks in WLAN, which not only detect, but also prevents the intruders in WLAN. The detection technique makes use of three status values that can be derived from the MAC layer: frequency of receiving RTS/CTS packets, frequency of sensing a busy channel, and the number of RTS/DATA retransmissions. When the number of RTS/CTS packets received exceeds a certain threshold RCth, it indicates that too many nodes are within the transmission range to compete for the channel. When the channel is sensed to be in a busy state, a node will persist in the backoff stage and stop the congestion window (CW) count. When stopping time is longer than a threshold SEth, it indicates that too many nodes are within the interference range.
Pagination: 145p.
Appears in Departments:University College of Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File43.13 kBAdobe PDFView/Open
02_certificate.pdf24.29 kBAdobe PDFView/Open
03_declaration.pdf22.07 kBAdobe PDFView/Open
04_acknowledgements.pdf19.68 kBAdobe PDFView/Open
05_abstract.pdf43.08 kBAdobe PDFView/Open
06_list of publications.pdf28.53 kBAdobe PDFView/Open
07_table of contents.pdf27.46 kBAdobe PDFView/Open
08_list of figures.pdf20.75 kBAdobe PDFView/Open
09_list of tables.pdf21.77 kBAdobe PDFView/Open
10_abbreviations.pdf30.08 kBAdobe PDFView/Open
11_terminology used.pdf27.32 kBAdobe PDFView/Open
12_chapter 1.pdf448.25 kBAdobe PDFView/Open
13_chapter 2.pdf127.51 kBAdobe PDFView/Open
14_chapter 3.pdf237.14 kBAdobe PDFView/Open
15_chapter 4.pdf221.36 kBAdobe PDFView/Open
16_chapter 5.pdf201.51 kBAdobe PDFView/Open
17_chapter 6.pdf39.11 kBAdobe PDFView/Open
18_bibliography.pdf63.51 kBAdobe PDFView/Open
19_webliography.pdf14.08 kBAdobe PDFView/Open
20_appendix.pdf332.85 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: