Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/323431
Title: | Enhancement in Intrusion Detection Techniques in WLAN |
Researcher: | Singh, Rupinder |
Guide(s): | Kumar, Dinesh |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Guru Kashi University |
Completed Date: | 2019 |
Abstract: | The proposed model is designed after keeping the wireless security in mind for the WLAN networks, which are the rapidly growing and most used networks across the globe. The WLAN networks offer the high bandwidth and free access to the users now-a-days on the public places, which make them more vulnerable and prone to several security attacks. The open access WLAN networks can be easily used for data spoofing and replication attacks to steal the sensitive information from the important and target users. Also, these attacks can be launched to spoof the financial data in the form point of sales (POS), online payment gateways, credit card information, net banking credentials and several other forms of information. All these information types creates highly sensitive environment to the users, and can cause severe social or financial damage to its users, which must be prevented in order to provide the smooth access to the users. newlineIn order to prevent those threats, the proposed model focuses upon the node integrity mechanism to protect the WLAN nodes from altercation, replication or spoofing attacks. All, these attacks are performed over the resource unavailability based attacks, such as distributed denial of service (DDoS), denial of service (DoS) and blackhole attacks. These attacks are used to target the availability of the real node, and then the spoofed information is used to hijack the active connection. If the resource availability is ensured during the network communications, the chances of information spoofing decrease severely. Hence, these attacks must be prevented in order to protect the user information. newlineIn this thesis, the strong mechanism has been proposed against the attacks, which relies upon the authentication and overhead slicing. The authentication mechanism is based upon the paired-key, and performed in the layered mechanism, which eventually protect the node identity from undergoing the spoofing attacks. Additionally, the node availability is protected with the overhead slicing methodology |
Pagination: | 162 |
URI: | http://hdl.handle.net/10603/323431 |
Appears in Departments: | Department of Computer Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01 title page.pdf | Attached File | 148.87 kB | Adobe PDF | View/Open |
02 declaration.pdf | 552.02 kB | Adobe PDF | View/Open | |
05 list of publications.pdf | 150.28 kB | Adobe PDF | View/Open | |
08 chapter 1.pdf | 581.79 kB | Adobe PDF | View/Open | |
09 chapter 2.pdf | 399.04 kB | Adobe PDF | View/Open | |
10 chapter 3.pdf | 314.02 kB | Adobe PDF | View/Open | |
11 chapter 4.pdf | 1.23 MB | Adobe PDF | View/Open | |
12 chapter 5.pdf | 1.29 MB | Adobe PDF | View/Open | |
13 chapter 6.pdf | 1.21 MB | Adobe PDF | View/Open | |
14 chapter 7.pdf | 264.32 kB | Adobe PDF | View/Open | |
15 chapter 8 references.pdf | 368.3 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 161.54 kB | Adobe PDF | View/Open | |
preliminary section.pdf | 267.85 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: