Loading

Analysis of Wireless Intrusion Detection and Prevention System against Cyber Attacks
P. Adlene Ebenezer1, Asha Shajee2, Dhruv Patel3, Himangshu Shekhar Saikia4, Rahul Mishra5

1P. Adlene Ebenezer, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
2Asha Shajee, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
3Dhruv Patel, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
4Himangshu Shekhar Saikia, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
5Rahul Mishra, Department of Computer Science Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
Manuscript received on 09 February 2019 | Revised Manuscript received on 05 April 2019 | Manuscript Published on 28 April 2019 | PP: 136-140 | Volume-7 Issue-5C February 2019 | Retrieval Number: E10330275C19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This is a proposed topology for a wireless networked control system. It is implemented under several cyber attack scenarios and a distributed intrusion detection system (IDS) is designed to identify the existence of attacks. More specifically, it presents a modelling framework for the closed-loop control system with the IDS. It ensures a computational procedure to design and compute the IDS. After successful detection, IPS will be implemented. IPS analyzes packets for harmful protocols and stops these packets from reaching their destination based on the results of IDS.
Keywords: IDS, IPS, Cyber Security, Cyber Attack, Intrusion Detection and Prevention, Analysis System.
Scope of the Article: Large-Scale Cyber Systems