IJTEEE
International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
PREVIOUS PUBLICATIONS



IJTEEE >> Volume 3 - Issue 10, October 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



Secure Hosts Using Operating System Intrusion Detection In Wireless Sensor Networks

[Full Text]

 

AUTHOR(S)

Hannan Ansari, Wasim Khan, Faizan Ahmad

 

KEYWORDS

Keywords : WSNs; Computer Network; Advance Computer Network; IDSs; OS level Intrusion detection.

 

ABSTRACT

ABSTRACT: As we know that we are living in Information World or we can say that we are living in Internet World. Now days we are all depend on Internet. It is very difficult for us that how we will secure our data, our system from Hackers, Intruders, Viruses, Worms and Some others Malicious activities. If we protect our Network, Hosts and O.S through any new technologies like IDSs then we can secure 90% transactions over the secure channel during Transmission of data on Internet. Due to these reasons I am focusing on a particular field that name is Operating System. You know that OS is a backbone of a particular system or Host. This Research paper is based on OS level Intrusion detection.

 

REFERENCES

[1] Vigna, Giovanni, and Christopher Kruegel. Host-based intrusion detection. na, 2006.

[2] Rahmatian, Mehryar, et al. "Hardware-Assisted De-tection of Malicious Software in Embedded Sys-tems." Embedded Systems Letters, IEEE 4.4 (2012): 94-97.

[3] Mirza, Muhammad Bilal, et al. "Malicious Software Detection, Protection & Recovery Methods: A Survey."

[4] Ying, Lin, Zhang Yan, and Ou Yang-jia. "The design and implementation of host-based intrusion de-tection system." Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on. IEEE, 2010.

[5] Bazzi, Ahmad, and Yoshikuni Onozato. "IDS for de-tecting malicious non-executable files using dynamic analysis." Network Operations and Management Symposium (APNOMS), 2013 15th Asia-Pacific. IEEE, 2013.

[6] Ansari, Alam, Arijit Chattopadhayay, and Suvrojit Das. "A kernel level vfs logger for building efficient file system intrusion detection system." Computer and Network Technology (ICCNT), 2010 Second International Conference on. IEEE, 2010.

[7] Sa-ngounwong, Sathaporn, and Pornsiri Muenc-haisri. "Runtime Detection of Software Modification Using RSCA Method." International Proceedings of Computer Science & Information Technology 39 (2012).

[8] Ansari, Hannan, Sachin Kumar Patel, and Sachida Nanda Barik. "Survey on Wireless Sensor Networks." (2014).