Abstract

Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions. Specifically, the Knowledge Discovery in Databases (KDD) Cup dataset is reviewed to highlight the design challenges of wireless intrusion detection based on current data attributes and proposed several guidelines to future-proof following traffic capture methods in the wireless network (WN). The paper starts with a review of various intrusion detection techniques, data collection methods and placement methods. The main goal of this paper is to study the design challenges of deploying intrusion detection system in a wireless environment. Intrusion detection system deployment in a wireless environment is not as straightforward as in the wired network environment due to the architectural complexities. So this paper reviews the traditional wired intrusion detection deployment methods and discusses how these techniques could be adopted into the wireless environment and also highlights the design challenges in the wireless environment. The main wireless environments to look into would be Wireless Sensor Networks (WSN), Mobile Ad Hoc Networks (MANET) and IoT as this are the future trends and a lot of attacks have been targeted into these networks. So it is very crucial to design an IDS specifically to target on the wireless networks.

Highlights

  • Computer system must ensure Confidentiality and integrity against network security attacks

  • The main wireless environments to look into would be Wireless Sensor Networks (WSN), Mobile Ad Hoc Networks (MANET) and Internet of Things (IoT) as this are the future trends and a lot of attacks have been targeted into these networks

  • This paper presents a survey to re-architecting Intrusion Detection System (IDS) design to accommodate IoT and Manet characteristics

Read more

Summary

Introduction

Computer system must ensure Confidentiality and integrity against network security attacks. Jhanjhi et al [1] describes that interconnectivity of huge number of devices and excessive usage of internet and data sharing increase the chances of security. Wanda et al [2] refers to intrusions as an act of disrupting the network traffic by compromising the integrity and confidentiality of computer systems. Liao et al [4] categorizes the various forms of IDs, such as host-based, network-based, wireless-based, network behavior analysis, and mixed IDs. According to Anthi et al [5], a simple IDs consists of sensors, an analysis engine, and a reporting system to allow data collection, analysis, and detection of anomalies in the network, as well as generating a warning to report the detected intrusion in the system

Objectives
Methods
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call