International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 10 | Year 2013 | Article Id. IJCTT-V4I10P167 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I10P167

Knowledge Based Context Awareness Network Security For Wireless Networks


Deepa U. Mishra

Citation :

Deepa U. Mishra, "Knowledge Based Context Awareness Network Security For Wireless Networks," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 10, pp. 3751-3757, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I10P167

Abstract

Context awareness network security is an effective solution to the problems, network systems are suffering from, such as worms, virus, network eavesdropping, sniffing etc. Traditional security controls exist but they operate exclusive to one another and cannot provide evaluation of threats. The false positive and negative rates of these devices are too high. Hence it is very difficult to obtain the security state of the whole network. This paper proposes Knowledge based Context Awareness Network Security (KCANS). The security alert events are gathered from various network security situation sensors which are then analyzed and fused using D-S evidence theory as fusion mechanism. Network security context is generated by extracting frequent attack patterns based on knowledge discovery method. Performance analysis shows that the proposed system have improved results in terms of average end to end delay, average energy consumption, packet delivery ratio and throughput as compared to without knowledge discovery technique.

Keywords

network security, situation awareness, knowledge discovery, security event

References

[1]. J.R. Goodall, W.G. Lutters and K. Anita, “The work of intrusion detection: rethinking the role of security analysts,” in Proc. of the Tenth Americas Conf. on Information System, New York, 2004, pp. 1421-1427.
[2]. M.E. Hellman, W. Diffie., “An Introduction to Cryptography” volume 67, pages 397–427. Proceedings of IEEE, March 1999.
[3]. M. R. Endsley, “Design and evaluation for situation awareness enhancement”, Proceeding of the human factors society 32nd annual meeting, Santa Monica, CA, pp.97-101, 1988.
[4]. Cyril Onwubiko, “Functional Requirements of Situational Awareness in Computer Network Security”, 2009 IEEE.
[5]. T. Bass, "Multi sensor Data Fusion for Next Generation Distributed Intrusion Detection Systems”, Invited Paper 1999 IRIS National Symposium on Sensor and Data Fusion, pp.24-27, May 1999.
[6]. T. Bass, "Intrusion Detection Systems and Multisensor Data Fusion ", Communications of the ACM, Vol. 43, No. 4, April 2000.
[7]. Liu Xiaowu, Wang Huiqiang, Lai Jibao, and Liang Ying, “Network Security Situation Awareness Model Based on Heterogeneous Multi-sensor Data Fusion”, 2007 IEEE.
[8]. Liu Xiaowu, Yu Jiguo, Wang MaoLi, “Network Security Situation Generation and Evaluation Based on Heterogeneous Sensor Fusion”, 2009 IEEE
[9]. Ying Liang, Hui-Qiang Wang, Ji-Bao Lai,“Quantification of Network Security Situational Awareness Based on Evolutionary Neural Network”, Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, 19- 22 August 2007 IEEE.
[10] Juan Wang, Feng-li Zhang, Jing Jin, Wei Chen, “Alert Analysis and Threat Evaluation in Network Situation Awareness”, 2010 IEEE.
[11] Babak Khosravifar, Jamal Bentahar, “An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot”, 22nd International Conference on Advanced Information Networking and Applications, 2008 IEEE.
[12] Zhao-Yang Qu, Ya-Ying Li, Peng-Li, “A Network Security Situation Evaluation Method Based on D-S Evidence Theory”, 2nd Conference on Environmental Science and Information Application Technology, 2010 IEEE
[13] Fang Lan, Wang Chunlei, and MaGuoqing, “A Framework for Network Security Situation Awareness Based on Knowledge Discovery” 2nd International Conference on Computer Engineering and Technology 2010 IEEE. 
[14] J Hall, J Pei, Y Yin, “Mining frequent patterns without candidate generation”.2000 ACM, SIGMOD int'I Conf on Management of Data (SIGMOD'OO), DallaS, TX, 2000     
[15] Jia Han, Micheline Kamber., “Data Mining concepts and techniques”, secondedition2006,ElsevierInc.