Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/3650
Title: | Study of the enhancements in intrusion detection techniques for wireless local area network (WLAN) |
Researcher: | Singh, Jatinder |
Guide(s): | Kaur, Lakhwinder Gupta, Savita |
Keywords: | WLAN Computer Engineering Intrusion Detection Techniques Wireless Local Area Network (WLAN) Intrusion Detection Wormhole attack |
Upload Date: | 24-Apr-2012 |
University: | Punjabi University |
Completed Date: | April, 2011 |
Abstract: | Wireless local area networks (wireless LANs, or WLANs) are changing the landscape of computer networking. In recent years, the proliferation of wireless devices coupled with the demand for continual network connections without having to "plug in," are resulting in an explosive growth in enterprise WLANs. Wireless networks offer the benefits of increased productivity, easier network expansion, flexibility, and lower the cost of ownership. In addition Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Following the increasing demand for wireless data access, different kind of wireless communication technologies are being developed continually. On the other hand, Wireless LAN standards offer very unsatisfactory level of security and one could not truly trust them. Some commonly used attacks are more strained in wireless environment and some additional effort should be used to prevent those. The nature of the radio communication makes it practically impossible to prevent some attacks. In the literature number of techniques had been developed to address different types of attacks, but the effective detection of especially the Session hijacking, Man-in-the-middle, Denial of Services; Distributed Denial of Services and Shrew attacks are remain open challenges. The research work seeks to investigate the design of effective intrusion detection techniques in the WLAN. The research work embrace with the comprehensive review of; (i) the outstanding vulnerabilities and attacks in WLAN, (ii) the wireless intrusion detection techniques, and (iii) the intrusion detection tools to analyze their performance and enhancements for WLAN. This study provides the suggestive guidelines on the selection and design of Intrusion Detection Techniques for WLAN. In the research work, three new robust, efficient intrusion detection techniques (namely Cross Layer Based, MAC Layer Based and Distributed techniques) have been proposed that attains low misdetection ratio and false positive rate while increasing the packet delivery ratio. Further, we have developed an algorithm to automatically assign priority to the detected attack by cross layer detection technique using MAC layer based defense architecture. The performance of all these techniques has been evaluated in NS2 tool on the Fedora platform. First, A MAC Layer Based defense scheme is developed for Reduction-of-Quality (RoQ) attacks in WLAN, which not only detect, but also prevents the intruders in WLAN. The detection technique makes use of three status values that can be derived from the MAC layer: frequency of receiving RTS/CTS packets, frequency of sensing a busy channel, and the number of RTS/DATA retransmissions. When the number of RTS/CTS packets received exceeds a certain threshold RCth, it indicates that too many nodes are within the transmission range to compete for the channel. When the channel is sensed to be in a busy state, a node will persist in the backoff stage and stop the congestion window (CW) count. When stopping time is longer than a threshold SEth, it indicates that too many nodes are within the interference range. |
Pagination: | 145p. |
URI: | http://hdl.handle.net/10603/3650 |
Appears in Departments: | University College of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 43.13 kB | Adobe PDF | View/Open |
02_certificate.pdf | 24.29 kB | Adobe PDF | View/Open | |
03_declaration.pdf | 22.07 kB | Adobe PDF | View/Open | |
04_acknowledgements.pdf | 19.68 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 43.08 kB | Adobe PDF | View/Open | |
06_list of publications.pdf | 28.53 kB | Adobe PDF | View/Open | |
07_table of contents.pdf | 27.46 kB | Adobe PDF | View/Open | |
08_list of figures.pdf | 20.75 kB | Adobe PDF | View/Open | |
09_list of tables.pdf | 21.77 kB | Adobe PDF | View/Open | |
10_abbreviations.pdf | 30.08 kB | Adobe PDF | View/Open | |
11_terminology used.pdf | 27.32 kB | Adobe PDF | View/Open | |
12_chapter 1.pdf | 448.25 kB | Adobe PDF | View/Open | |
13_chapter 2.pdf | 127.51 kB | Adobe PDF | View/Open | |
14_chapter 3.pdf | 237.14 kB | Adobe PDF | View/Open | |
15_chapter 4.pdf | 221.36 kB | Adobe PDF | View/Open | |
16_chapter 5.pdf | 201.51 kB | Adobe PDF | View/Open | |
17_chapter 6.pdf | 39.11 kB | Adobe PDF | View/Open | |
18_bibliography.pdf | 63.51 kB | Adobe PDF | View/Open | |
19_webliography.pdf | 14.08 kB | Adobe PDF | View/Open | |
20_appendix.pdf | 332.85 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: