Wireless Intrusion Detection System using Reputation
Santosh L Bidve1, Bhushan S Deshmukh2, Abhilash G Chamwad3, V K Pachghare4, Rahul B Adhao5
1Santosh L Bidve, Department of Computer Engineering and Information Technology, College of Engineering Pune, Shivajinagar, Pune, (Maharashtra). India.
2Bhushan S Deshmukh, Department of Computer Engineering and Information Technology, College of Engineering Pune, Shivajinagar, Pune, (Maharashtra). India.
3Abhilash G Chamwad, Department of Computer Engineering and Information Technology, College of Engineering Pune, Shivajinagar, Pune, (Maharashtra). India.
4V K Pachghare, Department of Computer Engineering and Information Technology, College of Engineering Pune, Shivajinagar, Pune, (Maharashtra). India.
5Rahul B Adhao, Department of Computer Engineering and Information Technology, College of Engineering Pune, Shivajinagar, Pune, (Maharashtra). India.
Manuscript received on 20 November 2015 | Revised Manuscript received on 30 November 2015 | Manuscript published on 30 November 2015 | PP: 7-9 | Volume-4 Issue-5, November 2015 | Retrieval Number: B1408054215©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Development in the field of Information Technology has led to increase in speed of Internet. With the increase in internet users there is a tremendous increase in network traffic. Increase in network traffic has also increased the threat of intrusion over the network. For the ever growing internet speed there is a necessity to modify the intrusion detection system in order to detect the intrusion threats across the network. In order to meet these needs of Intrusion detection system we can use the combination of packet based and flow based systems. Reduction of false alarm is also a matter of concern in intrusion detection.
Keyword: Intrusion Detection, Reputation, IP Flow, Packet Flow.
Scope of the Article: Wireless Communication