Skip to main content

An Efficient Security System in Wireless Local Area Network (WLAN) Against Network Intrusion

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 763))

Abstract

The computer network faces any kind of unauthorized activities i.e. Network Intrusion (NI). The detection of these NI needs a better understanding of how the attacks work. The NI detection is necessary to protect the system information in current activities of the cyber attacks. This paper is intended to improve the security aspect in the Wireless Local Area Network (WLAN) by implementing a machine learning approach i.e. Support Vector Machines (SVMs). In this, the computer lab generated data are used for experimentation. The SVM detects the NI by recognizing the patterns of attack. The simulation outcome of the proposed security framework recognizes the NI and bells the alarm. The analysis of this security system is performed by considering the efficiency of detection and false alarm rate that offers significant coverage and effective detection.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Patel, A., Qassim, Q., Wills, C.: A survey of intrusion detection and prevention systems. Inf. Manag. Comput. Secur. J. 18(4), 277–290 (2010)

    Article  Google Scholar 

  2. Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection – a review. Nat. Comput. 6(4), 413–466 (2007)

    Article  MathSciNet  Google Scholar 

  3. Loo, C.E., et al.: Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4), 313–332 (2006)

    Article  Google Scholar 

  4. Wu, H., Freedman, J., Ivory, C.J.: Network intrusion detection and analysis system and method. US Patent 7,493,659, 17 Feb 2009

    Google Scholar 

  5. Guerrero-Zapata, M., et al.: The future of security in wireless multimedia sensor networks. Telecommun. Syst. 45(1), 77–91 (2010)

    Article  Google Scholar 

  6. Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Lee, W., Wespi, L.M.A. (eds.) Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 2212, pp. 172–189 (2001)

    Google Scholar 

  7. Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou, S.: Specification-based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the 9th Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, pp. 265–274 (2002)

    Google Scholar 

  8. Mitchell, R., Chen, I.R.: Behavior rule based intrusion detection for supporting secure medical cyber physical systems. In: International Conference on Computer Communication Networks, Munich, Germany (2012)

    Google Scholar 

  9. Berthier, R., Sanders, W.: Specification-based intrusion detection for advanced metering infrastructures. In: Proceedings of the 17th Pacific Rim International Symposium on Dependable Computing, Pasadena, CA, USA, pp. 184–193 (2011)

    Google Scholar 

  10. Cárdenas, A.A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: The 6th Symposium on Information, Computer and Communications Security, Hong Kong, China, pp. 355–366 (2011)

    Google Scholar 

  11. Chen, Y., Luo, B.: S2a: secure smart household appliances. In: The Second Conference on Data and Application Security and Privacy, San Antonio, TX, USA, pp. 217–228 (2012)

    Google Scholar 

  12. Jokar, P., Nicanfar, H., Leung, V.: Specification-based intrusion detection for home area networks in smart grids. In: International Conference on Smart Grid Communications, Brussels, Belgium, pp. 208–213 (2011)

    Google Scholar 

  13. Ali, Q.I.: Design and implementation of an embedded intrusion detection system for wireless applications. IET Inf. Secur. 6(3), 171–182 (2012)

    Article  Google Scholar 

  14. Alotaibi, B.: A majority voting technique for wireless intrusion detection systems (2016)

    Google Scholar 

  15. Gu, W., et al.: Null data frame: a double-edged sword in IEEE 802.11 WLANs. IEEE Trans. Parallel Distrib. Syst. 21(7), 897–910 (2010)

    Article  Google Scholar 

  16. Kumar, V., et al.: Detection of stealth man-in-the-middle attack in wireless LAN. In: Proceedings of the 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC). IEEE (2012)

    Google Scholar 

  17. Salem, O., Yaning, L., Ahmed, M.: Anomaly detection in medical WSNs using enclosing ellipse and chi-square distance. In: 2014 IEEE International Conference on Communications (ICC). IEEE (2014)

    Google Scholar 

  18. Sbeiti, M., et al.: Paser: secure and efficient routing approach for airborne mesh networks. IEEE Trans. Wirel. Commun. 15(3), 1950–1964 (2016)

    Article  Google Scholar 

  19. Sun, T., Liu, X.: Agent-based intrusion detection and self-recovery system for wireless sensor networks. In: Proceedings of the 5th IEEE International Conference on Broadband Network & Multimedia Technology (IC-BNMT). IEEE (2013)

    Google Scholar 

  20. Wu, K., et al.: hJam: attachment transmission in WLANs. IEEE Trans. Mob. Comput. 12(12), 2334–2345 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. H. Latha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Latha, P.H., Vasantha, R. (2019). An Efficient Security System in Wireless Local Area Network (WLAN) Against Network Intrusion. In: Silhavy, R. (eds) Software Engineering and Algorithms in Intelligent Systems. CSOC2018 2018. Advances in Intelligent Systems and Computing, vol 763. Springer, Cham. https://doi.org/10.1007/978-3-319-91186-1_2

Download citation

Publish with us

Policies and ethics