DocumentCode :
3077697
Title :
Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks
Author :
Gupta, Arpan ; Pandey, Om Jee ; Shukla, M. ; Dadhich, Ajay ; Mathur, S. ; Ingle, Atul
Author_Institution :
Dept. of ECE, Jaipur Eng. Coll. & Res. Centre, Jaipur, India
fYear :
2013
fDate :
26-28 Dec. 2013
Firstpage :
1
Lastpage :
7
Abstract :
The emerging trend of ubiquitous and pervasive computing aims at embedding everyday devices such as wrist-watches, smart phones, home video systems, autofocus cameras, intelligent vehicles, musical instruments, kitchen appliances etc. with microprocessors and imparts them with wireless communication capability. This advanced computing paradigm, also known as the Internet of Things or cyber-physical computing, leads internet and computing to appear everywhere and anywhere using any device and location. With maximum appreciation and due regards to the evolutionary arc, depth and scope of ceaseless internet utilities, it is equally necessary to envisage the security and data confidentiality challenges posed by the free and ubiquitous availability of internet. Wireless communication, by virtue of a plethora of networked devices, is severely prone to illegal use, unauthorized access, protocol tunneling, eavesdropping, and denial of service attacks as these devices are unknowingly exposed to illegal access from undefined locations. Amidst the rapidly expanding arena of cybercrime, banks, stock exchanges, business transactions and shopping firms such as Amazon and eBay are heavily dependent on internet. The freedom offered by wireless and 3G based internet communication and its open character has led to many incidences of abuse of technology. Unrestricted accessibility to internet has intensified the likelihood of sophisticated attacks, malicious intrusions and malware, capable of inflicting widespread damage on modern human life and economy. The classical intrusion detection systems have been found to be less equipped to handle the magnitude and complexity of wireless networks due to enormous user activities and constantly varying behavior patterns. This paper analyses the role of computational intelligence techniques to design adaptive and cognitive intrusion detection systems that can efficiently detect malicious network activities and proposes novel three-tier archite- ture for designing intelligent intrusion detection systems for wireless networks.
Keywords :
artificial intelligence; computer network security; radiocommunication; ubiquitous computing; 3G based Internet communication; Amazon; Internet of Things; banks; business transactions; computational intelligence based intrusion detection systems; computing paradigm; cyber-physical computing; cybercrime; data confidentiality; eBay; malicious intrusions; malware; pervasive computing networks; shopping firms; sophisticated attacks; stock exchanges; wireless communication capability; wireless communication networks; Communication system security; Computational intelligence; IP networks; Internet; Security; Wireless networks; IP address; MAC address; Pervasive computing; adaptation; attacks; computational intelligence; intrusion detection; wireless integration;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on
Conference_Location :
Enathi
Print_ISBN :
978-1-4799-1594-1
Type :
conf
DOI :
10.1109/ICCIC.2013.6724156
Filename :
6724156
Link To Document :
بازگشت