Free Essay

Distributed Intrusion Detection Using Mobile Agent in Distributed System

In:

Submitted By kuldeepj
Words 2840
Pages 12
Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA)

Distributed Intrusion Detection using Mobile Agent in Distributed System
Kuldeep Jachak
University of Pune, P.R.E.C Loni, Pune, India

Ashish Barua
University of Pune, P.R.E.C Loni, Delhi, India

ABSTRACT
Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System (DS) is become serious challenge. One such serious challenge in DS security domain is detection of rogue points in network. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. This paper gives the new idea for detecting rouge point using Mobile agent. Mobile agent technology is best suited for audit information retrieval which is useful for the detection of rogue points. Using Mobile agent we can find the intruder in DS as well as controller can take corrective action. This paper presents DIDS based on Mobile agents and band width consumed by the Mobile Agent for intrusion detection.

information it receives from each of the monitors. Some of the issues with the existing centralized ID models are:  Additions of new hosts cause the load on the centralized controller to increase significantly. As a result, it makes the IDS non-scalable. Communication with the central component can overload parts of the network.



Some of these IDSs contain platform specific components.

2. RELATED WORK
The Distributed Intrusion Detection System (DIDS) is aimed at building distributed IDS that places monitors at every host and the network along with a centralized data analysis component (DIDS director) for data analysis. The DIDS architecture does not scale well for large networks since addition of any new component increases the load on the DIDS director component, and the data flow from monitors to DIDS director can consume high network bandwidth. DIDMA addresses these scalability problems by using mobile agents for decentralized data analysis [2]. Although fair amount of work has been done in investigating efficient methods of detecting rogue point in wireless and wired LAN, this area still offers plenty of opportunity for further investigation in this regards as most of the solutions available today are far from satisfactory. The brief information of related work has been mentioned below. Monitoring RF waves and IP traffic are two broad classes of approaches to detecting rogue APs. Most existing commercial products take the first approach they either manually scan the RF waves using sniffers e.g., Air Magnet, Nets tumbler or automate the process using sensors. Wireless clients are instrumented to collect information about nearby APs and send the information to a centralized server for rogue point detection. Wired and wireless connections can be separated by visually inspecting the timing in the packet traces of traffic generated by the clients. The Cooperating Security Managers (CSM) [3] is a distributed IDS that uses decentralized architecture consisting of security managers installed on every monitored host that coordinate with other managers to detect distributed attacks. On large networks, it requires coordination with higher number of managers to detect every attack, and hence scalability can be an issue. DIDMA performs decentralized data analysis using mobile agents that makes it more scalable. DIDMA uses platform independent components in contrary to platform specific security managers of CSM. The Autonomous Agents for Intrusion Detection (AAFID) project [4] makes use of multiple layers of agents organized in a hierarchical structure with each layer performing a set of

Keywords
Mobile Agent, Intrusion detection system, Distributed System, Rouge Point.

1. INTRODUCTION
The growing importance of network security is shifting security concerns towards the network itself rather than being host based. Security services must be evolving into networkbased and distributed approaches to deal with heterogeneous open platform and support scalable solution [1]. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Intrusion Detection System (IDS) must analyze and correlate a large volume of data collected from different critical network access points. This task requires IDS to be able to characterize distributed patterns and to detect situations where a sequence of intrusion events occurs in multiple hosts [1]. Computer networks connected to Internet are always exposed to many kinds of cybercrimes. An Internet user with malicious intent can access, modify, or delete sensitive information present on other computers or make some of the computer services unavailable to other users. The infrastructure of current computer networks is so huge and complex that it is almost impossible to completely secure such networks. Therefore, an intrusion detection system (IDS) is needed to detect and respond effectively whenever the confidentiality, integrity, and availability of computer resources are under attack [2] Most of the current distributed IDSs use centralized Intrusion Detection (ID) models made of individual host and network monitors along with a centralized controller component. The individual monitors send intrusion data to the centralized controller component that performs analysis of the

1

Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA) intrusion detection tasks. AAFID uses only static agents and is deprived of some of the benefits mobile agents can offer. The Intrusion Detection Agent (IDA) system [5] consists of sensors running in every monitored host that report Marks Left by Suspected Intruder (MLSI) and a central manager responsible for dispatching tracing agents to the host whose sensor reports an MLSI. The tracing agents gather information related to intrusion from the sensors and send it to central manager for analysis. In DIDMA, there is no central manager, and mobile agents perform the aggregation and correlation function in a decentralized manner. Mobile agents are employed to apply human immune system model for intrusion detection in [6]. This IDS works on anomaly based detection principle where each mobile agent travels to every host in the network to detect any deviation from the normal behavior of that host. The intelligent agents for intrusion detection project [7], have developed IDS using distributed multiple layers of lightweight intelligent mobile agents that apply data mining techniques to detect intrusions. One of the most recent work described in [8], uses components very similar to our IDS entities. Manager component of [8] dispatches mobile agents and analyzes the gathered data, whereas the MAD in DIDMA is involved with dispatching attack specific MAs and maintain the VHL to record the hosts on which suspicious activities are detected. The mobile agents in [8] are of two types: patrolling and fixed. While fixed agent is similar to our static agents used for host monitoring purpose, the patrolling agents are different from the MAs used in DIDMA. Patrolling agents just collect intrusion related data from the monitored hosts, while MAs used in our work gather data from the victim hosts, and also aggregate and correlate it with the data received from previous hosts. Therefore, MAs perform both the function of manager and patrolling agent and thus reduces load on the central component by decentralized data analysis. MAs are attack specific and are dispatched based upon the activities detected by the SAs. The mobile agents used in DIDMA use Voyager [9] mobile agent platform. Voyager offers secure socket for encrypted transmission of agents and JAVA sandbox type security, and hence, also run on secure platform similar to [8]. Object persistence is also provided in Voyager using object activation framework for loading objects on demand from the servers. Therefore, DIDMA does not require any extra effort for regeneration and recovery of agents like in [8] that uses GYPSY mobile agent platform. The IDS described in [10] is made of several layers of agents. Each layer sends information to the layer above it. The bottom layer is called surveillance agents that move to every hosts and collect intrusion related data in order to send the data to the upper layers for analysis and response. The IDS discusses how IDS with multiple smaller components are better than a single monolithic IDS module. The mobile agents of [10] are not attack specific, and do not perform any data analysis. Analysis of data is carried out by separate decision making agents.   Limited Flexibility: Intrusion detection systems have typically been written for a specific environment Limited Response Capability: IDSs have traditionally focused on detecting attacks. While detection serves a useful purpose, often times a system administrator is not able to immediately analyze the reports from IDS and take appropriate action. No Generic Building Methodology: In general, the cost of building IDS from available components is considerable, due in large part to the absence of a structured methodology. No such structuring insights have emerged from the field itself.



4. REQUIRMENTS OF DIDS
Network-level monitoring and distribution pose some new requirements on intrusion detection systems:  Networks produce a large amount of data (events). Therefore, a distributed intrusion detection system (DIDS) should provide mechanisms that allow the Network Security Officer (NSO) to customize event “collectors” so that they listen for only the relevant events. Relevant events are usually visible in only some parts of the network (especially in the case of large networks).Therefore, a DIDS should provide some means of determining where to look for events. A DIDS should generate a minimum amount of traffic over the network. Therefore, there should be some local processing of event data. A DIDS needs to be scalable. At a minimum, “local” should interoperate with other DIDSs (possibly in a hierarchical structure).

 

 

For maximum effectiveness, NIDSs should be able to interoperate with host-based IDSs so that misuse patterns include both network events and operating system events.

5. OUR APPROACH 5.1 Introduction of Mobile Agents
The Distributed Intrusion Detection System (DIDS) is a project representing an extension of the NSM, with the aim of adding two features missing from NSM. These are the ability to monitor the behavior of a user who is connected directly to the network using a dial-up line (and who therefore may not generate observable network traffic), and the ability to allow intrusion detection over encrypted data traffic. The DIDS project is sponsored by UC Davis, the Lawrence Livermore National Labs (LLNL), Haystack Laboratory and the US Air Force.  Host agent module: An audit collection module operating as a background process on a monitored system. Its purpose is to collect data on security related events on the host and transmit these to the central manager. LAN monitor agent module: Operates in the same fashion as a host agent module except that it analyzes LAN traffic and reports the results to the central manager. Central manager module: Receives reports from LAN monitor and host agents and processes and correlates these reports to detect intrusion

3. DRAWBACKS OF EXISTING SYSEM
Manual RF scanning is very time consuming and detects rogue AP only when scanning is applied. This leaves ample scope for an attacker to launch attack and finish its work before he gets detected. This is severe loophole of this method.   Lack of Efficiency: Host-based IDSs often slow down a system and network-based IDSs drop network packets that they don’t have time to process. High Number of False Positives: False alarms are high and attack recognition is not perfect.

 

2

Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA) These records are then reformatted into a standardized format referred to as the host audit record (HAR). Next, a templatedriven logic module analyzes the records for suspicious activity. At the lowest level, the agent scans for notable events that are of interest independent of any past events. Examples include failed file accesses, accessing system files, and changing a file's access control. At the next higher level, the agent looks for sequences of events, such as known attack patterns (signatures). Finally, the agent looks for anomalous behavior of an individual user based on a historical profile of that user, such as number of programs executed, number of files accessed, and the like Here we propose architectures to detect rogue point using mobile agent. Below are the abbreviations used in this architecture: SA- Server Application CA- Client Application MAS- Mobile Agent System Fig 1: Architecture of DIDS MA- Mobile Agent

5.2 Why Mobile Agents?
After initial euphoria of mobile agent, now expectations of research community from mobile agent are more realistic. After decade of first introduction of mobile agents, it is now clear that mobile are best suited for remote information retrieval. Considering nature of mobile computing where computing hosts are away from each other and in such scenario if we want to know what is happening on remote host, use of mobile agent become unavoidable. Therefore detection of presence of rogue access point in wired, wireless or hybrid (wired as well as wireless mixed) type of network is a fit case for use of mobile agent for such detection.

5.4 Detection Methodology
As shown in Fig. 3, SA will start generating alpha-numeric strings after every 2 minutes. It will broadcast them over entire network. Computers which will be active at that time will record these strings and will acknowledge them. Mean time MA will start from central server. SA with itself will have file containing so far generated alpha numeric strings.MA will take this file from SA. MA will select any active computer from network randomly and will visit that computer.MA will ask to produce any past generated alphanumeric string. This selection of past generated, to be asked, alpha-numeric key will be totally random in manner so that attacker will find it difficult in guessing the pattern of selection. As Client is an authorized computer, it will have that alpha-numeric key with it. He will produce it and will get authenticated. This process will repeat for another client by using random computer selection method. If client will not have MAS and CA deployed on it, MA will not get executed on it. As MA is not getting executed on one of computers of your network, this will be considered as serious offence and access point connected that computer will be declared as rogue point and client will be marked as intruder. In this way we managed to detect intruders and rogue point. After visiting all computers MA will return to central server and will take newly updated file of alpha-numeric strings from SA. After that it will again keep visiting computers in network in above mentioned manner. If the client has stolen the alphanumeric key from trusted client in this case MA will check the alphanumeric keys as well as attributes of files like date of creation etc. from these audit information server can take action against that client.

5.3 Mobile Agent Architecture
The scheme is designed to be independent of any operating system or system auditing implementation. Fig. 2 shows the general approach that is taken. The agent captures each audit record produced by the native audit collection system. A filter is applied that retains only those records that are of security interest.

5.5 Bandwidth Consumed by Mobile Agent
The total bandwidth consumed in a centralized IDS model can be given by Eq.1. H*C……………………. (1) C - The amount of raw data (greater than 20KB in normal cases) at a host. H - Total number of monitored hosts in the network. Fig 2: Architecture of Mobile Agent

3

Emerging Trends in Computer Science and Information Technology -2012(ETCSIT2012) Proceedings published in International Journal of Computer Applications® (IJCA)

Server

Client

SA
MAS
MA

CA
MA
MAS

MA
S

Audit Info.

Audit Info.

Fig 3: Mobile Agent based architecture for Intrusion Detection

In DIDMA, the total bandwidth consumed can be calculated by summing up the bandwidth consumed by an MA while moving from one host to another along with the gathered data. Assume that Sm is the initial size of an MA when it is dispatched from the MAD, S0 is the initial size of the attack trace data gathered by an MA after visiting first host, and S 1 is the size of data carried by an MA after visiting the second host. After correlating the data received at the second host with the data gathered by an MA from the first host, the resulting increment in the size of initial attack trace data is S1S0 = Sinc .For the sake of simplicity of analysis, we assume that the initial size S0 is constantly incremented by Sinc due to each subsequent visit of the MA to any host. The total bandwidth consumed by DIDMA is given by Equation 2. N*(2*(Sm+S0 ) + (N-1)* Sinc ) /2 …………2 The above equation is derived by considering that ( Sm + S0 ) increases with an increment of Sinc at every host. N is the number of hosts added to the network out of total H monitored hosts, where N

Similar Documents

Free Essay

Disaster Recovery Management Com-540-Mbol1

...COM-540-MBOL1 Contents Background 3 NIST SP 800-94 3 Intrusion Detection and Prevention Principles 4 Key Functions of IDPS Technologies 4 Detection Options 4 Types of IDPS Technologies 5 IDPS Technologies 5 Proper Installation 6 Testing and Deployment 6 Securing the IDPS 6 IDPS Updates 6 Building and Maintaining Skills – Additional Resources Required to Support 6 Using and Integrating Multiple IDPS Technologies 7 Review of the IDPS Marketplace 8 Comparison of IPS Products 9 Summary 9 Background The National Institute of Standards and Technology commonly known and referred to as NIST, is a government funded agency. NIST defines their mission statement as “NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.” (NIST General Information, 2014). NIST is involved in mostly every area of Information Technology from the latest Trusted Identity (Leithauser & Curran, 2012) standards formatting to the handling and processing of DNA (DNA research, 2013). In recent years the President of the United States signed a Memorandum implementing a Digital Government Strategy. The government recognizing mobile device vulnerabilities and the high risk of data loss assigned NIST to implement IDS and other security standards. In a recent Mobile Security Report published NIST highlights “As a part of the strategy...

Words: 2456 - Pages: 10

Premium Essay

Artificial Intelligence in Cyber Defense

...Estonia tyugu@ieee.org Abstract- The speed of processes and the amount of data to be used in defending the cyber space cannot be handled by humans without considerable automation. However, it is difficult to develop software with conventional fixed algorithms (hard-wired logic on decision making level) for effectively defending against the dynamically evolving attacks in networks. This situation can be handled by applying methods of artificial intelligence that provide flexibility and learning capability to software. This paper presents a brief survey of artificial intelligence applications in cyber defense (CD), and analyzes the prospects of enhancing the cyber defense capabilities by means of increasing the intelligence of the defense systems. After surveying the papers available about artificial intelligence applications in CD, we can conclude that useful applications already exist. They belong, first of all, to applications of artificial neural nets in perimeter defense and some other CD areas. From the other side – it has become obvious that many CD problems can be solved successfully only when methods of artificial intelligence are being used. For example, wide knowledge usage is necessary in decision making, and intelligent...

Words: 4861 - Pages: 20

Premium Essay

Seminar

...Seminar Report Security Issues in MANETs Abhishek Seth 04329001 November12 ,2004 Abstract Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic differences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure. problems of secuirity in MANETs. Further sections deals with some of the solutions to these problems. Finally Section 10 concludes this article. 2 2.1 Mobile Adhoc Networks Introduction 1 Introduction Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others needs the aid of intermediate nodes to route their packets. These networks are fully distributed, and can work at any place without the help of any infrastructure. This property makes these networks highly flexible and robost...

Words: 7859 - Pages: 32

Premium Essay

Technical Paper and Seminar Report

...Section 10 concludes this article. Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help of other intermediate nodes to establish communication channels. In such an environment, malicious intermediate nodes can be a threat to the security of conversation between mobile nodes. The security experience from the Wired Network world is of little use in Wireless Mobile Ad hoc networks, due to some basic differences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure. 1 2 2.1 Mobile Adhoc Networks Introduction Mobile Adhoc Network (MANET) is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others needs the aid of intermediate nodes to route their packets. These networks are fully distributed, and can work at any place without the help of any infrastructure. This property makes these networks highly flexible and robost. The characteristics of these networks are summarized as follows: Introduction • Communication via wireless means. A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate...

Words: 7796 - Pages: 32

Free Essay

Manet

...Security Issues in MANET.pdf (Size: 182.57 KB / Downloads: 225) Security Issues in MANETs Presented By: Abhishek Seth 04329001 Abstract Mobile Ad hoc Networks (MANET) has become an ex¬citing and important technology in recent years because of the rapid proliferation of wireless devices. A mo¬bile adhoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a Mobile Adhoc Network usually seek the help ofother intermediate nodes to establish communication channels. In such an environment, malicious interme¬diate nodes can be a threat to the security of conver¬sation between mobile nodes. The security experience from the Wired Network world is oflittle use in Wire¬less Mobile Ad hoc networks, due to some basic differ¬ences between the two Networks. Therefore, some novel solutions are required to make Mobile Adhoc Network secure. 1 Introduction A Mobile Adhoc Network is a group of wireless mo¬bile computers in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Application such as military excercises, disaster relief, and mine site operation may benefit from adhoc networking, but secure and reliable communication is a necessary pre¬requisite for such applications. MANETS are more vulnerable to attacks than wired networks due to open medium, dynamically changing network topology, cooperative algorithms, lack of cen-tralized...

Words: 8182 - Pages: 33

Premium Essay

Firewall

...Centralized management of all functionality • Deep application control • Comprehensive, built-in IDS/IPS • Tightly integrated QoS and link balancing • Template-based and role-based configuration • Built-in web security (model F100 and higher) Integrated Next-Generation Security The Barracuda NG Firewall is designed and built from the ground up to provide comprehensive, next-generation firewall capabilities. Cloud-hosted content filtering and reporting offload compute-intensive tasks to the cloud for greater resource efficiency and throughput. Based on application visibility, user-identity awareness, intrusion prevention, and centralized management, the Barracuda NG Firewall is the ideal solution for today’s dynamic enterprises. True Enterprise Readiness The Barracuda NG Firewall meets the enterprise requirements for massive scalability and efficient management across distributed networks. Integrated WAN optimization and dedicated centralized management appliances...

Words: 1351 - Pages: 6

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...

Words: 15250 - Pages: 61

Premium Essay

Hello

...manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual Private Network. A Virtual Private Network (VPN) that provides remote access to a corporate intranet or extranet over a shared infrastructure with the same policies as a private network. Access VPNs encompass analog, dial, ISDN, Digital Subscriber Line (DSL), mobile IP, and cable technologies to securely connect mobile users, telecommuters...

Words: 23221 - Pages: 93

Premium Essay

Risk Management System

...ADAPTIVE RISK MANAGEMENT SYSTEM (ARMS) FOR CRITICAL INFRASTRUCTURE PROTECTION Mihaela Ulieru and Paul Worthington Emergent Information Systems Laboratory The University of Calgary Ulieru@ucalgary.ca http://www.enel.ucalgary.ca/People/Ulieru/ Abstract The purpose of this work is to develop an adaptive risk management framework capable to prevent, identify and respond in critical time to threats. Our focus is on protecting critical infrastructure (e.g. public utilities) which vitally depends on network and information security. As solution we propose a holonic Cybersecurity system that unfolds into an emergency response management infrastructure capable to react in due time to unknown and new kinds of attacks/threats. The system can adapt to its changing environment through its self-organizing capability. Mimicking the way immunity works in biological organisms the system can dynamically adapt to embrace new risk situations and can dynamically create and learn new risk models as it encounters new risk situations. Keywords. Risk management, holonic, self-organization, multi-agent systems. 1. Rationale During the emergency response to the September 11, 2001 attack on the World Trade Centre, emergency response commanders on the scene were unable to communicate to ‘911’ Public Service Access Points (PSAP) that people should evacuate the building. As a result, PSAP operators complied with New York City’s standard operating procedure for hi-rise fires and advised...

Words: 8296 - Pages: 34

Free Essay

Wireless Sensor Networks

... Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security. Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary. Introduction With the recent rapid improvement on technology, many networking technologies have been created to make communication easy. One such technology is distributed wireless sensor network which has a capability of observing the physical world and process the data and in addition make decisions basing...

Words: 5106 - Pages: 21

Free Essay

Ankara

...An ISS Technical White Paper Wireless LAN Security 802.11b and Corporate Networks 6303 Barfield Road · Atlanta, GA 30328 Tel: 404.236.2600 · Fax: 404.236.2626 WWireWireless Lan Security 802.11b Wireless LAN Security Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely candidate to become widely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth – comparable to a standard Ethernet wired LAN in performance. An upcoming version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. It is expected to have security concerns similar to 802.11b. This low cost, combined with strong performance and ease of deployment, mean that many departments and individuals already use 802.11b, at home or at work – even if IT staff and security management administrators do not yet recognize wireless LANs as an approved technology. This paper addresses the security concerns raised by both current and upcoming 802.11 network technologies. Wireless LAN Business Drivers Without doubt, wireless LANs have a high gee-whiz factor. They provide always-on network connectivity, but don’t require a network cable. Office workers can roam from meeting to meeting throughout a building, constantly connected to the same network resources enjoyed by wired...

Words: 3757 - Pages: 16

Premium Essay

The Internet of Things

...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...

Words: 18072 - Pages: 73

Premium Essay

Voip

...………. Building Blocks of Converged IP Communications Networks) ………. Network Infrastructure) ………. Applications) ………. End Points (Client Devices) ) ………. Call Processing) ………. Major IP Communications Solutions) ………. IP Telephony) ………. Considerations for Deploying IP Telephony) ………. IP Conferencing) ………. IP Contact Centers) ………. Unified Messaging) ………. Rich Media Communications—Integrated Audio, Video, and Web Conferencing) IP Videoconferencing) ………. IP Video Telephony) ………. Extension Mobility) ………. IP Telephony Applications) ………. Mobility Applications) ………. Softphones/Soft-agents ) ………. 802.11a/b/g Wireless LANs and Wireless or Soft IP Phones ) ………. Teleworker / Support) ………. Emergency Alerting Applications ) ………. Business Continuity / Disaster Recovery) ………. Land and Mobile Radio Convergence) ………. N11 Services—211, 311, 511, 711 Services to Relieve Overburdened 911 Systems ) ………. Video/Audio-On-Demand, E-Learning) ………. A "Typical" VoIP Configuration………. The Economics of VoIP ………. Selecting the Right Products for Investment Protection and On-Going Management ………. The Business Case for IP Communications— Return on Investment (ROI) and Total Cost of Ownership (TCO) ) ………. VoIP implementation technical considerations) ………. Network Infrastructure—Advanced Intelligent Network Features) ………. Cabling) ………. Network Infrastructure) ………. LAN Network Design) ………. Power over Ethernet...

Words: 10553 - Pages: 43

Premium Essay

Voip and Ip Telephony Implementations

...Communications Networks) ………. Network Infrastructure) ………. Applications) ………. End Points (Client Devices) ) ………. Call Processing) ………. Major IP Communications Solutions) ………. IP Telephony) ………. Considerations for Deploying IP Telephony) ………. IP Conferencing) ………. IP Contact Centers) ………. Unified Messaging) ………. Rich Media Communications—Integrated Audio, Video, and Web Conferencing) IP Videoconferencing) ………. IP Video Telephony) ………. Extension Mobility) ………. IP Telephony Applications) ………. Mobility Applications) ………. Softphones/Soft-agents ) ………. 802.11a/b/g Wireless LANs and Wireless or Soft IP Phones ) ………. Teleworker / Support) ………. Emergency Alerting Applications ) ………. Business Continuity / Disaster Recovery) ………. Land and Mobile Radio Convergence) ………. N11 Services—211, 311, 511, 711 Services to Relieve Overburdened 911 Systems ) ………. Video/Audio-On-Demand, E-Learning) ………. A "Typical" VoIP Configuration………. The Economics of VoIP ………. Selecting the Right Products for Investment Protection and On-Going Management ………. The Business Case for IP Communications— Return on Investment (ROI) and Total Cost of Ownership (TCO) ) ………. VoIP implementation technical considerations) ………. Network Infrastructure—Advanced Intelligent Network Features) ………. Cabling) ………. Network...

Words: 10550 - Pages: 43

Premium Essay

Business Analytics

...Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? Mieke Jans, Nadine Lybaert, Koen Vanhoof Abstract Fraud is a million dollar business and it’s increasing every year. The numbers are shocking, all the more because over one third of all frauds are detected by ’chance’ means. The second best detection method is internal control. As a result, it would be advisable to search for improvement of internal control systems. Taking into consideration the promising success stories of companies selling data mining software, along with the positive results of research in this area, we evaluate the use of data mining techniques for the purpose of fraud detection. Are we talking about real success stories, or salesmanship? For answering this, first a theoretical background is given about fraud, internal control, data mining and supervised versus unsupervised learning. Starting from this background, it is interesting to investigate the use of data mining techniques for detection of asset misappropriation, starting from unsupervised data. In this study, procurement fraud stands as an example of asset misappropriation. Data are provided by an international service-sector company. After mapping out the purchasing process, ’hot spots’ are identified, resulting in a series of known frauds and unknown frauds as object of the study. 1 Introduction Fraud is a million dollar business and it is increasing every year. ”45% of companies worldwide have fallen victim...

Words: 6259 - Pages: 26