Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9i32/100196
Year: 2016, Volume: 9, Issue: 32, Pages: 1-5
Original Article
Ravi Shanker, Ashish Kr. Luhach*and Amit Sardar
Department of Computer Science and Engineering, Lovely Professional University, Phagwara - 144411, Punjab, India; [email protected]
[email protected]
[email protected]
*Author for correspondence
Ashish Kr. Luhach
Department of Computer Science and Engineering
Email:[email protected]
Objectives: Wireless technologies enable devices to communicate without any guided medium. It uses radio frequency for transmitting data, where the wired technologies use cables. It is mostly used to refer a telecommunications network that is interconnected between nodes and implemented without any kind of wires like as a computer network. Due to unguided media it’s very tedious to detect any intrusion during communication. The aim of this work is to develop an approach which will detect and prevent black hole attacks so the any unauthorized or unwanted nodes if participates in the communication process will be detected in the real time. Methods/Statistical Analysis: In our work we are going to propose IDS which will helps to provide security to detect attacks and to prevent the attacks. Centralize and synchronized IDS node will work on the basis of anomaly detection technique. It will create pattern for malicious activates and do event detection on the basis of anomaly detection. Findings: The proposed method will enhance the detection of anomaly detection techniques with synchronized IDS within the cluster as well as between the clusters with the help of DRI table. Application/Improvement: This technique will helps to enhance security in Wireless network and helps to make more reliable network for user.
Keywords: Attacks, Anomaly, Cluster, Intrusion Detection System, Malicious
Subscribe now for latest articles and news.