Skip to main content

Wi-Fi Optimization Using Parabolic Reflector and Blocking Materials in Intrusion Detection Systems

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 814))

  • 1168 Accesses

Abstract

Intrusion detection system (IDS) is a software application which monitors the system, network activities, finds vulnerabilities if present, and protects digital data in a safe manner. An IDS monitors network traffic and data, features selection, analysis and action or detection, and also alert generation during life cycle. Firewall technique is one of the system-based protection techniques which is used to protect the private network from the public network. The areas where IDSs are used are in financial, healthcare, technical fields like MANET, cloud computing and its security, data mining. There are three types of intrusion detection systems—HIDS, NIDS, and APIDS. HIDS is based on sensors, where it can obtain data from operating system. HIDS can also tell attacker’s activity by analyzing network. NIDS is also based on network sensors. NIDSs can collect network information and can audit network attacks, while packet is moving across the network. APIDS works based on behavior and event of the protocol. IDS prevents various attacks based on OSI layer like DoS or DDoS attack, eavesdropping, spoofing, U2R, logon abuse, application-based. IDS system can be affected by the signal strength where in this paper the objective is to enhance detection rate of intrusion detection system based on Wi-fi optimization where we have tried to show that how some basic materials can affect intrusion detection system through Wi-fi signal strength.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vijayarani, S., Maria Sylviaa, S.: Intrusion detection system—a study. Int. J. Secur. Priv. Trust Manag. (IJSPTM) 4(1) (2015)

    Google Scholar 

  2. Dickerson, J., Dickerson, J.: Fuzzy network profiling for intrusion detection. In: Annual Conference of the North American Fuzzy Information Processing Society—NAFIPS, pp. 301–306 (2000). https://doi.org/10.1109/nafips.2000.877441

  3. Aydın, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35, 517–526 (2009). ISSN:0045-7906 https://doi.org/10.1016/j.compeleceng.2008.12.005

  4. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009). ISSN 0167-4048, https://doi.org/10.1016/j.cose.2008.08.003. (http://www.sciencedirect.com/science/article/pii/S0167404808000692)

  5. Goodall, J.R., Lutters, W.G., Komlodi, A.: Developing expertise for network intrusion detection. Inf. Technol. People 22(2), 92–108 (2009). https://doi.org/10.1108/09593840910962186

    Article  Google Scholar 

  6. Erickson, J.: Planck’s Equation. http://www.csun.edu/~jte35633/worksheets/Chemistry/52PlancksEq.pdf

  7. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defence Applications (CISDA 2009) pp. 53–58. ISBN: 978-1-4244-37634. http://dl.acm.org/citation.cfm?id=1736481.1736489

  8. Poole, I.: Radio-electronics.com, resources and analysis for electronics engineers, parabolic reflector antenna theory. IEEE 802.11 Wikipedia, Channel and frequencies Electromagnetic spectrum Wikipedia

    Google Scholar 

  9. Salunkhe, U.R., Mali, S.N.: Security enrichment in intrusion detection system using classifier ensemble. J. Electr. Comput. Eng. 2017, Article ID 1794849, 6 pages (2017). https://doi.org/10.1155/2017/1794849

  10. Scullion, F.: Atomic theory, finding the energy of a photon. www.scribd.com/document/169352643/Energy-of-Foton

  11. Astronomer’s toolbox.: The Electromagnetic Spectrum—National Aeronautics and Space Administration. https://imagine.gsfc.nasa.gov/science/toolbox/toolbox.html

  12. Salunkhe, U.R., Mali, S.N.: Security enrichment in intrusion detection system using classifier ensemble. J. Electr. Comput. Eng. 2017, Article ID 1794849 (2017)

    Google Scholar 

  13. Parabola Reflector Antenna Theory.: http://www.radioelectronics.com/info/antennas/parabolic/parabolic-reflector-antenna-theory.php

  14. Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51, 3448–3470 (2007). ISSN:1389-1286, http://dx.doi.org/10.1016/j.comnet.2007.02.001, https://doi.org/10.1016/j.comnet.2007.02.001

  15. Stapel, E.: Conics: Parabolas: Introduction http://www.purplemath.com/modules/parabola.htm

  16. Telagarapua, P., Lakshmi Prasanthib, A., Vijaya Santhic, G., Ravi Kirand, B.: Design and analysis of parabolic reflector with high gain pencil beam and low side lobes by varying feed. Int. J. Adv. Netw. Appl. 03(02), 1105–1115 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumanta Kumar Deb .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deb, S.K., Bhowmik, A., Maity, B., Sarkar, A., Chattopadhyay, A. (2019). Wi-Fi Optimization Using Parabolic Reflector and Blocking Materials in Intrusion Detection Systems. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 814. Springer, Singapore. https://doi.org/10.1007/978-981-13-1501-5_67

Download citation

Publish with us

Policies and ethics