Reference Hub5
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN

Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN

Gulshan Kumar, Rahul Saha, Mandeep Singh, Mritunjay Kumar Rai
Copyright: © 2018 |Volume: 12 |Issue: 1 |Pages: 10
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522543060|DOI: 10.4018/IJISP.2018010105
Cite Article Cite Article

MLA

Kumar, Gulshan, et al. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN." IJISP vol.12, no.1 2018: pp.53-62. http://doi.org/10.4018/IJISP.2018010105

APA

Kumar, G., Saha, R., Singh, M., & Rai, M. K. (2018). Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. International Journal of Information Security and Privacy (IJISP), 12(1), 53-62. http://doi.org/10.4018/IJISP.2018010105

Chicago

Kumar, Gulshan, et al. "Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN," International Journal of Information Security and Privacy (IJISP) 12, no.1: 53-62. http://doi.org/10.4018/IJISP.2018010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Wireless LAN networks are considered to be widely used and efficient infrastructure used in different domains of communication. In this paper, we worked on Network Intrusion Detection System (NIDS) to prevent intruder's activities by using snooping agents and honeypot on the network. The idea behind using snooping agents and honeypot is to provide network management in term of monitoring. Honey pot is placed just after the Firewall and intrusion system have strongly coupled synchronize with snooping agents Monitoring is considered at packet level and pattern level of the traffic. Simulation filtered and monitor traffic for highlight the intrusion in the network. Further attack sequence has been created and have shown the effects of attack sequence on scenario which have both honey pot and snoop agent with different network performance parameters like throughput, network load, queuing delay, retransmission attempt and packet. The simulation scenario shows the impact of attack on the network performance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.