Reduce the False Positive and False Negative from Real Trafficwith Intrusion Detection in Zigbee Wireless Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract: Denial-of-Service attack in particular is a threat to zigbee wireless networks. It is an attack in whichthe primary goal is to deny the legitimate users access to the resources. A node is prevented from receiving andsending data packets to its destinations.Typically the traffic through the network is heterogeneous and it flowsfrom multiple utilities and applications Considering todays threats in network there is yet not a single solutionto solve all the issues because the traditional methods of port-based and payload-based with machine learningalgorithm suffers from dynamic ports and encrypted application.Many internationalnetworkequipmentmanufactures like cisco, juniper also working to reduce these issues in the hardware side.Here this paperpresents a new approach considering the idea based on SOTC.This method adapts the current approaches withnew idea based on service-oriented traffic classification(SOTC) and it can be used as an efficient alternate toexisting methods to reduce the false positive and false negative traffic and to reduce computation and memoryrequirements.By evaluating the results on real traffic it confirm that this method is effective in improving theaccuracy of traffic classification considerably,and promise to suits for a large number of applications.Finally, itis also possible to adopt a service database built offline, possibly provided by a third party and modeled afterthe signature database of antivirus programs,which in term reduce the work of training procedure andoverfitting of parameters in case of parameteric classifier of supervised traffic classification.

Authors and Affiliations

Sivashanmugam . N

Keywords

Related Articles

 Modern Computer Implementation on Smart Phone withAndroid Platform for Smes (UMKM) in Optimization ServicesDistrict Malang

Abstract: The use of Android in the smartphone operating system currently used by many companies. Because of its superiority as a software that uses computer code base that can be distributed openly (open source) so many...

 A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion

Abstract: This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief overview of a hybrid approach of genetic algorithm and fuzzy to improve anoma...

 Dimensionality Reduction Evolution and Validation

Abstract: In this paper, proposing visualized and quantitative evaluation methods for validation dimensionalityreduction techniques performance. Four well known techniques for dimensionality reduction evaluated, verifyth...

 A Novel identity based secure distributed data storage scheme

 Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for...

 Real Time Hand Gesture Recognition for Human Machine Communication Using ARM Cortex A-8

 Abstract: A novel method proposes for human machine communication using ARM Cortex A-8 processor. Gesture is a form of non-verbal communication in which visible bodily actions communicate particular messages. A nov...

Download PDF file
  • EP ID EP158211
  • DOI -
  • Views 70
  • Downloads 0

How To Cite

Sivashanmugam . N (2015).  Reduce the False Positive and False Negative from Real Trafficwith Intrusion Detection in Zigbee Wireless Networks. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 20-28. https://europub.co.uk/articles/-A-158211