e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science Volume:02/Issue:12/December -2020 Impact Factor- 5.354 www.irjmets.com
AN IMPLEMENTAION OF SNORT BASED INTRUSION DETECTION SYSTEM USING WIRELESS SENSOR NETWORK R. Hamsaveni*1 *1Assistant
Professor, Department of Computer Science and Applications, D.K.M College for Women, Thiruvalluvar University, Vellore, India.
ABSTRACT The IDS mechanism considers various factors like traversal path, time, energy, a lifetime of the network, security of packet. The energy overhead generated by flooding control messages and another protocol support packets decrease the latency of the node as well as the whole system. By considering all these issues, the proposed method has to be designed in such a way to increase the throughput ratio. The previous approaches use hop count based methods which are not optimum in a dynamically changing environment. The othert echniques produce more latency which reduces the TP of the network. The routing procedure takes more time than the time to live value assigned by the source node. The methods produce more packet drop ratio; the poor route management as well reduced security for intrusion detection because the node deletes the path available once there is no data transfer for some time. Some of the approaches use control messages to collect the neighbor information which increases the overhead of additional packets transmitted and indirectly increases the traffic and latency in the WSN. Throughput: The cost generated by the previous approaches due to network overhead reduces the packet delivery ratio and network throughput. Keywords : Wireless Sensor Network, Throughput, Intrusion Detection System.
I.
INTRODUCTION
A Computer Network is an interconnected group of autonomous computing nodes which use a welldefined, mutually agreed set of rules and conventions known as Protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Wireless sensor networks have exhibited significant growth within the last few years in both home and corporate environments. In the current network age, the security issues is the most paramount topic in networking, securing network boundaries using intrusion detection system ensures maintenance of many company assets and ensures the services reliability as such many companies and organizations spends more in security in order to maintained their services. However, as a result of vast increase in technology and lack of integrating good security practice in software and hardware design which has leads to backdoors, bugs and so on. A number of network attacks are increasing dramatically, ranging from denial of services, IP spoofing eavesdropping, mitnick, man in the middle attack (MITM) masquerading and malware attacks (Snehal and Jadhav,2010)[11]. These attacks have made traditional network security mechanism ineffective, which requires additional defense mechanism that can analyze, detect and mitigate these attacks. However, in order to address these challenges, intrusion detection system is now widely used as a network perimeter security. Intrusion detection has been almost studied nearly 20 years back (Ning and Jajodia, 2001)[12]. Intrusion detection system is deployed in conjunction with other security mechanism to provide a better network defense against unauthorized access by user and malicious code attacks. However, several reasons make deployment of intrusion detection system to be unavoidably part of the entire defense system. Many systems and applications are deployed without much security consideration and due to lack of good security practices in computer related application design. Moreover, a lot of different open source and commercial intrusion detection systems are in existence, the different types of intrusion detection systems depend on the nature of the environment where these systems are deployed, either through Network-based intrusion detection systems or Host-based intrusion www.irjmets.com
@International Research Journal of Modernization in Engineering, Technology and Science
[1022]