Abstract
Intrusion detection system (IDS) is a software application which monitors the system, network activities, finds vulnerabilities if present, and protects digital data in a safe manner. An IDS monitors network traffic and data, features selection, analysis and action or detection, and also alert generation during life cycle. Firewall technique is one of the system-based protection techniques which is used to protect the private network from the public network. The areas where IDSs are used are in financial, healthcare, technical fields like MANET, cloud computing and its security, data mining. There are three types of intrusion detection systems—HIDS, NIDS, and APIDS. HIDS is based on sensors, where it can obtain data from operating system. HIDS can also tell attacker’s activity by analyzing network. NIDS is also based on network sensors. NIDSs can collect network information and can audit network attacks, while packet is moving across the network. APIDS works based on behavior and event of the protocol. IDS prevents various attacks based on OSI layer like DoS or DDoS attack, eavesdropping, spoofing, U2R, logon abuse, application-based. IDS system can be affected by the signal strength where in this paper the objective is to enhance detection rate of intrusion detection system based on Wi-fi optimization where we have tried to show that how some basic materials can affect intrusion detection system through Wi-fi signal strength.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Vijayarani, S., Maria Sylviaa, S.: Intrusion detection system—a study. Int. J. Secur. Priv. Trust Manag. (IJSPTM) 4(1) (2015)
Dickerson, J., Dickerson, J.: Fuzzy network profiling for intrusion detection. In: Annual Conference of the North American Fuzzy Information Processing Society—NAFIPS, pp. 301–306 (2000). https://doi.org/10.1109/nafips.2000.877441
Aydın, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35, 517–526 (2009). ISSN:0045-7906 https://doi.org/10.1016/j.compeleceng.2008.12.005
GarcĂa-Teodoro, P., DĂaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009). ISSN 0167-4048, https://doi.org/10.1016/j.cose.2008.08.003. (http://www.sciencedirect.com/science/article/pii/S0167404808000692)
Goodall, J.R., Lutters, W.G., Komlodi, A.: Developing expertise for network intrusion detection. Inf. Technol. People 22(2), 92–108 (2009). https://doi.org/10.1108/09593840910962186
Erickson, J.: Planck’s Equation. http://www.csun.edu/~jte35633/worksheets/Chemistry/52PlancksEq.pdf
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defence Applications (CISDA 2009) pp. 53–58. ISBN: 978-1-4244-37634. http://dl.acm.org/citation.cfm?id=1736481.1736489
Poole, I.: Radio-electronics.com, resources and analysis for electronics engineers, parabolic reflector antenna theory. IEEE 802.11 Wikipedia, Channel and frequencies Electromagnetic spectrum Wikipedia
Salunkhe, U.R., Mali, S.N.: Security enrichment in intrusion detection system using classifier ensemble. J. Electr. Comput. Eng. 2017, Article ID 1794849, 6 pages (2017). https://doi.org/10.1155/2017/1794849
Scullion, F.: Atomic theory, finding the energy of a photon. www.scribd.com/document/169352643/Energy-of-Foton
Astronomer’s toolbox.: The Electromagnetic Spectrum—National Aeronautics and Space Administration. https://imagine.gsfc.nasa.gov/science/toolbox/toolbox.html
Salunkhe, U.R., Mali, S.N.: Security enrichment in intrusion detection system using classifier ensemble. J. Electr. Comput. Eng. 2017, Article ID 1794849 (2017)
Parabola Reflector Antenna Theory.: http://www.radioelectronics.com/info/antennas/parabolic/parabolic-reflector-antenna-theory.php
Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51, 3448–3470 (2007). ISSN:1389-1286, http://dx.doi.org/10.1016/j.comnet.2007.02.001, https://doi.org/10.1016/j.comnet.2007.02.001
Stapel, E.: Conics: Parabolas: Introduction http://www.purplemath.com/modules/parabola.htm
Telagarapua, P., Lakshmi Prasanthib, A., Vijaya Santhic, G., Ravi Kirand, B.: Design and analysis of parabolic reflector with high gain pencil beam and low side lobes by varying feed. Int. J. Adv. Netw. Appl. 03(02), 1105–1115 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Deb, S.K., Bhowmik, A., Maity, B., Sarkar, A., Chattopadhyay, A. (2019). Wi-Fi Optimization Using Parabolic Reflector and Blocking Materials in Intrusion Detection Systems. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 814. Springer, Singapore. https://doi.org/10.1007/978-981-13-1501-5_67
Download citation
DOI: https://doi.org/10.1007/978-981-13-1501-5_67
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1500-8
Online ISBN: 978-981-13-1501-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)