Professional Documents
Culture Documents
Godswill Complete Project
Godswill Complete Project
BY
DECEMBER, 2018
TABLE OF CONTENTS
Table Of Contents i
Statement Of The Problem 3
Purpose Of The Study 4
Scope Of The Study 4
Significance Of The Study 4
Hypotheses 5
Chapter Two 6
Review Of Related Literature 6
Conceptual Framework 6
Empirical Framework 19
Summary Of Literature Review 20
Design Of The Study 22
Area Of The Study 22
Population Of The Study 23
Sample And Sampling Technique 24
Instrument For Data Collection 24
Method Of Data Collection 24
Validation Of The Instrument 24
Chapter Four 25
Data Presentation And Analysis Of Data 25
Chapter Five 30
Discussion Of Findings 30
Educational Implication Of The Study 31
Recommendation 32
Suggestion For Further Studies 32
Limitation Of The Study 33
Summary 33
References 34
i
CHAPTER ONE
INTRODUCTION
The availability of Wireless networks has opened a new and exciting world for many
users IT technology is advancing and changing every day and its popularity is
increasing. The biggest concern with wireless network, however, has been security.
For some time wireless network security has been an issue the world over. In
addition to improved encryption schemes a new solution to help combat this problem
is the Wireless Intrusion Detection System (WIDS).
In the security and wireless technology, this has fast become a major part of securing
a network. The next sections will cover details of what a WIDS is and can do, along
with incident response, and creating a wireless policy. Today, wireless technology
plays a significant role in every aspect of our lives, both personal and public.
However, the growth in the use of wireless technology has brought new challenges
and limitations to user's privacy. This is because wireless networks are vulnerable to
a number of attacks and threats; examples include unauthorized access, Denial of
Service, and Distributed Denial of Service attacks. The intrusion problem in a
wireless network has become one of the leading causes of concern with the increased
use of wireless networks. While the intrusion problem has existed for decades, the
problem has been rising in intensity and vigour as more end-users use computers,
the internet, The Web, mobile, and ad-hoc wireless networks.
1
However, there is a wide-spread, and connection convenience means that an attack
can happen at multiple remote locations at any time. Therefore, the field of wireless
network and communication security has become essential and needs to be protected
from attacks. Further, the integrity and availability of these systems must be
protected to provide the necessary facilities to make them safe from unexpected
attacks.
Intrusion Detection
A Wireless IDS is similar to a standard, wired IDS, but has additional deployment
requirements as well as some unique features specific to WLAN intrusion and
misuse detection.
2
Statement of the Problem
A variety of other WLAN threats exist and additional vulnerabilities that could affect
a Higher Institution or Campus’ WLAN are being identified at an ever-increasing
pace, these include:
The point is that these threats are real, they can cause extensive damage, and they
are becoming more prevalent. Without some sort of detection mechanism, it can be
difficult to identify the threats to a WLAN. A lack of threat awareness can lead to a
network not adequately secured against the threats facing it. Only when the Network
Administrators identify are realize the threats to the network can the WLAN be
properly equipped with the necessary security measures
There’s no denying that a strong campus wireless local area network is critical in
terms of attracting and retaining students in higher education. Here we are dealing
with a user base that expects to be connected via desktop PCs, laptops, smartphones,
tablets, gaming devices and more, plus the load of Internet of Things (IoT) Integrated
Technologies that campuses should be adopting to stay on the cutting edge and
remain competitive among institutions. IT professionals managing Higher
Institutions WLANs must be constantly evaluating the strength and performance of
their network since colleges and universities cannot know how secure their networks
are unless they conduct wireless vulnerability assessment. This research will
describe the need for wireless intrusion detection, provide an explanation of wireless
3
intrusion detection systems, and identify the benefits and drawbacks of a wireless
intrusion detection solution.
4
• It will further help designers increase the network security measures for
wireless networks.
• The study will further serve as a useful material for researchers in related
fields.
Research Questions
Hypotheses
• There is no significant importance of Intrusion Detection Systems to
Wireless Local Area Network in AIFCE.
• Wireless Intrusion Detection Systems do not improve network security of
AIFCE
• Wireless Intrusion and Detection System is not extensively used in Alvan
Ikoku Federal College of Education.
5
CHAPTER TWO
Conceptual Framework
Theoretical Framework
CONCEPTUAL FRAMEWORK
Concept of Local Area Network
A Local Area Network (LAN) is a group of computers and associated devices that
share a common communications line or wireless link to a server. Typically, a Local
Area Network (LAN) encompasses computers and peripherals connected to a server
within a distinct geographic area such as an office or a commercial establishment.
Computers and other mobile devices use a LAN connection to share resources such
as a printer or network storage.
6
by Data point Corporation in 1976 and announced in 1977. It had the first
commercial installation in December 1977 at Chase Manhattan Bank in New York.
The development and proliferation of personal computers using the CP/M operating
system in the late 1970s, and later DENIAL OF SERVICE -based systems starting
in 1981, meant that many sites grew to dozens or even hundreds of computers. The
initial driving force for networking was generally to share storage and printers,
which were both expensive at the time. There was much enthusiasm for the concept
and for several years, from about 1983 onward, computer industry pundits would
regularly declare the coming year to be, “The year of the LAN”.
In the early 1990s, WLANs were very expensive and were only used when wired
connections were strategically impossible. By the late 1990s, most WLAN solutions
7
and proprietary protocols were replaced by IEEE 802.11a and IEEE802.11n.
Wireless Local Area Network (WLAN) prices also began to decrease significantly.
Wireless Local Area Network (WLAN) should not be confused with the Wi-Fi
Alliance's Wi-Fi trademark. Wi-Fi is not a technical term, but is described as a
superset of the IEEE 802.11 standard and is sometimes used interchangeably with
that standard. However, not every Wi-Fi device actually receives Wi-Fi Alliance
certification, although Wi-Fi is used by more than 700 million people through about
750,000 Internet connection hot spots.
Intrusion
8
Wiktionary defines intrusion as the forcible inclusion or entry of an external group
or individual; the act of intruding.
A wrongful entry after the determination of a particular estate, made before the
remainderman or reversioner has entered .
Detection
While there are several types of IDS, ranging in scope from single computers to large
networks, the most common classifications are Network Intrusion Detection
Systems (NIDS) and Host-Based Intrusion Detection Systems (HIDS). A system that
monitors important operating system files is an example of Host-Based Intrusion
9
Detection Systems (HIDS), while a system that analyses incoming network traffic is
an example of a Network Intrusion Detection Systems (NIDS). It is also possible to
classify IDS by detection approach: the most well-known variants are signature-
based detection (recognizing bad patterns, such as malware) and anomaly-based
detection (detecting deviations from a model of "good" traffic, which often relies on
machine learning). Some IDS have the ability to respond to detected intrusions.
Systems with response capabilities are typically referred to as an intrusion
prevention system.
Wireless Security
Many laptop computers have wireless cards pre-installed. The ability to enter a
network while mobile has great benefits. However, wireless networking is prone to
some security issues. Hackers have found wireless networks relatively easy to break
into, and even use wireless technology to hack into wired networks. As a result, it is
10
very important that enterprises define effective wireless security policies that guard
against unauthorized access to important resources. Wireless Intrusion Prevention
Systems (WIPS) or Wireless Intrusion Detection Systems (WIDS) are commonly
used to enforce wireless security policies.
Rupinder Singh Gill (2009) identified some security objectives that a WLAN should
provide to the network nodes. These include:
Integrity: The WLAN must be able to detect any changes that happen to the data in
transit, both intentional and unintentional.
Availability: The WLAN and its resources should be accessible to all individuals
and devices on demand. WLAN should prevent or at least mitigate against attacks
on the usability of the network such as denial of service attacks.
Access Control: The WLAN should restrict the rights of the devices and individuals
to access the network and its resources. The identities of WLAN nodes should be
established and verified using strong authentication.
11
Security Systems Real-secure Server sensor and wireless scanner products (Internet
Security Systems Wireless Products). A homegrown wireless IDS can be developed
with the use of the Linux operating system, for example, and some freely available
software. Open source solutions include Snort among others.
Architecture
12
Threat Detection
According to Jamil Farshschi (2003), a wireless IDS can also aid in the detection of
a number of attacks. Not only can a wireless IDS detect rogue WAPS, identify non-
encrypted 802.11 traffic, and help isolate an attacker's physical location, as
mentioned earlier - a wireless IDS can detect many of the standard (and not-so
standard) wireless attacks and probes as well (LURHQ Threat Intelligence Group)
Intrusion Detection systems fall into two broad categories. These are:
Network Based Systems: These types of systems are placed on the network, nearby
the system or systems being monitored. They examine the network traffic and
determine whether it falls within acceptable boundaries.
Host Based Systems: These types of systems actually run on the system being
monitored. These examine the system to determine whether the activity on the
system is acceptable.
There are also recent types of intrusion detection system: Those that reside in the
operating system kernel and monitor activity at the lowest level of ,’1the system.
13
These systems have recently started becoming available for a few platforms, and are
relatively platform specific.
Network Based Intrusion Detection Systems are those that monitor traffic on the
entire network segment. A Network Interface Card (NIC) can operate in one of two
modes, these being:
Normal Mode: where packets which are destined for the computer (as determined
by the ethernet or MAC address of the packet) are relayed through to the host system.
Promiscuous Mode: where all packets that are seen on the ethernet are relayed to
the host system.
A network card can normally be switched from normal mode to promiscuous mode,
and vice-versa, by using a low-level function of the operating system to talk directly
to the network card to make that change. Network based intrusion detection systems
normally require that a network interface card is in promiscuous mode.
Once a network packet has arrived at the host that it was intended for, there is still
available a third line of defence behind the firewall and network monitor. This is
called "host based intrusion detection", and comes in several flavours.
Network monitors: These monitor incoming network connections to the host, and
attempt to determine whether any of these connections represent a threat. Network
connections that represent some kind of intrusion attempt are acted on. Note that this
is different to network based intrusion detection, as it only looks at network traffic
14
coming to the host it is running on, and not all traffic passing the network. For this
reason it does not require promiscuous mode on the network interface.
Host monitors: These monitor files, file systems, logs, or other parts of the host
itself to look for particular types of suspicious activity that might represent an
intrusion attempt (or a successful intrusion). Systems administration staff can then
be notified about any problems that are found.
It is possible on most hosts to monitor packets that attempt to access the host before
those packets are passed onto the networking layer of the host itself. This mechanism
attempts to protect a host by intercepting packets that arrive for the host before they
can do any damage.
Kernel based intrusion detection is a relatively new art form, and one that is starting
to become prevalent, especially within Linux.
There are two main kernel based intrusion detection systems currently available for
Linux. These are OpenWall and LIDS. These systems take the approach of
preventing buffer overflows, increasing file system protection, blocking signals, and
generally making it difficult for an attacker to compromise a system. LIDS also takes
steps to prevent certain actions by the root user, such as installing a packet sniffer or
changing firewall rules.
Obviously, systems like LIDS and systems such as Tripwire take a rather different
approach to attempting to achieve the same thing. Both of these packages attempt to
prevent a cracker from using the system for unauthorised purposes.
15
At first glance, one might think that a system such as Tripwire is less than perfectly
useful. While it is a Good Thing to monitor file systems for signs of abuse, it is
readily accepted that once your system has been compromised by an external
intruder, it is time to shut down and rebuild. The damage has been done, and the
system integrity cannot be guaranteed so it is best to re-build your operating system
from the pristine version supplied on CD from your vendor. The approach offered
by LIDS seems much more attractive - to protect the system from damage rather
than to note that the gate was left open after the horse has bolted, so to speak.
Although I tend to agree with this analysis in principle, there is a stronger level of
security offered by running both LIDS and Tripwire together. While LIDS is
exceptional in its capability to protect the file system, it is worth using a file system
monitoring package such as Tripwire as an "independent" auditor, in the event that
an exceptionally knowledgeable hacker should manage to somehow defeat LIDS.
The benefits to a wireless IDS are numerous, but there are several drawbacks to
consider before deploying such a system. Wireless intrusion detection is a rather new
technology. Caution should be taken before applying any new technology to an
operational network. Because the technology is new, there may be bugs, or worse
vulnerabilities which could potentially weaken the WLAN security. Wireless
Intrusion Detection System technology is developing at a rapid pace though, and this
caveat may not be a deterrent in the future. A potential turn-off to a wireless IDS
solution may be cost.
The expense of the vendor solutions may be prohibitive. In such a case, a home-
grown solution can be developed, but this approach may prove costly as well due to
the extensive human capital that may be required to develop such a solution. Also,
16
the cost of the wireless IDS solution (vendor-based or home-grown) will grow in
conjunction with the size of the WLAN to be monitored, due to the requirement for
a greater number of sensors. Therefore, the larger the WLAN, the more expensive
the wireless IDS deployment will be.
A wireless IDS is only as effective as the individuals who analyse and respond to
the data gathered by the system. A wireless IDS, like a standard IDS, can require
vast human resources to analyse and respond to threat detection. In fact, it can be
argued that a wireless IDS will require more human resources than a standard IDS
because with a wireless IDS, individuals will be required to both attend to the logical
(alert data) and physical aspects (finding and catching the hackers) of an attack.
While the technology is still relatively new, the costs may be prohibitive, and the
human capital outlay may be higher than that of a standard IDS, a wireless IDS can
still prove to be a beneficial component of a security solution.
Theoretical Framework
This study will rely on the Game Theory, a mathematical model that enables the
analysis of the interactions between several decision makers (called players) who
can have conflicting or common objectives (Bacci G., Lasaulce S., Saad, W., &
Sanguinetti L. 2015)
Game Theory is a branch of mathematics that enables the modelling and analysis of
the interactions between several decision makers (called players) who can have
conflicting or common objectives. A game is a situation in which the benefit or cost
achieved by each player from an interactive situation not only depends on its own
decisions but also on those taken by the other players. In a game, the actions and
objectives of the players are tightly coupled. The interactions that take place in a
17
network can often be modelled as a game, in which the network nodes are the players
that compete or form coalitions to get some advantage and enhance their quality of
service.
Animesh Patcha and Jung-Min Park (2005) in their paper, gave some assumptions
that one makes while formulating a game as:
• There are at least two players in a game and each player has two or more well-
specified choices or sequences of choices
• Every possible combination of plays available to the players leads to a well-
defined end-state (win, loss, or draw) that terminates the game.
• Associated with each possible outcome of the game is a collection of numerical
payoffs. These payoffs represent the value of the outcome to the different players
• All decision makers are rational; that is, each player, given two alternatives, will
select the one that yields the greater payoff.
They categorized Game theory into cooperative game theory and non-cooperative
game theory but focused on Non-Cooperative Game Theory as it relates to intrusion
detection. Non-cooperative games can also be classified as complete information
games or incomplete information games, based on whether the players have
complete or incomplete information about their adversaries in the game. Here,
information denotes the payoff-relevant characteristics of the adversaries. In a
complete information game, each player has complete knowledge about his/her
adversary’s characteristics, strategy paces and so on.
18
In the intrusion detection game, the objective of the attacker is to send a malicious
message from some attack node with the intention of attacking the target node. The
intrusion is deemed successful when the malicious message reaches the target
machine without being detected by the Host IDS. We assume that an intrusion is
detected and the intruding node is blocked when a message sent by a probable
intruder is intercepted and the Host IDS can say with certainty that the message is
malicious in nature. Wireless Intrusion Detection Systems are frameworks that are
designed and have been deployed to assess what happens beyond the firewall and
either take direct action when problems crop up or alert network security
administrators or team members of a looming breach in wireless network security.
Empirical Framework
A number of studies have been conducted to investigate on Intrusion and Detection
systems and strategies for wireless networks.
Rupinder Singh Gill (2009) made a similar research (thesis) on “Intrusion Detection
Techniques in Wireless Local Area Networks”. The research was carried out to
investigate wireless intrusion and detection techniques for detecting attacks on IEEE
802.11i Robust Secure Networks (RSNs). The research proposed novel intrusion
detection strategies with which to tackle the requirements for monitoring network
security and also studied the correlation of the generated alarms across wireless
intrusion detection systems (WIDS) sensors and the detection strategies or
techniques for greater reliability. After the research had been carried out, it was
concluded that despite using a number of preventive security measures, IEEE 802.Iii
RSNs still suffers from multiple vulnerabilities that can be exploited by an adversary
to launch attacks against them, hence the need for using a monitoring framework as
a second layer of defense for WLANs. Such a monitoring capability can be
19
implemented using a wireless intrusion detection system. The research thesis
developed wireless intrusion detection techniques that could be applied extensively
to any radio communication network.
20
available, to protect against virtually every type of threat that is currently known
about.
21
CHAPTER THREE
RESEARCH METHODOLOGY
This chapter is presented under the following sub-headings: Design of the Study,
Area of the Study, Sample and Sampling Technique, Instrument for Data Collection,
Validity of Instrument, Reliability of Instruments, Administration of the Instrument,
Method of Data Analysis.
22
The Institution has six schools which include the:
School of Arts
School of Education
School of Sciences
The educational institution also has an ICT/MIS Centre with was set up/established
on the 29th of October, 2013. The ICT Centre is a Service unit which is responsible
for students’ biographic and demographic data, staff data management, staff and
student training, and offers advisory ICT services to the College management. The
ICT/MIS Centre has a Director and Deputy Director, who manage its day-to-day
running. The Centre also has staff from all disciplines of ICT who help ensure the
centre functions as it should. The ICT training lab is equipped with fifty computers
and networked through wireless connections.
23
Sample and Sampling Technique
Since the population is small, the whole population will be used to carry out the
research.
24
CHAPTER FOUR
𝛴𝑥 2.4+2.8+3.32+2.92+2.96
Average mean score, x = 𝑁
= 5
= 2.88, accepted.
Table 4.1 above contains items 1 to 5 with mean scores of 2.4, 2.8, 3.32, 2.92 and
2.96respectively from the opinions of the respondents. Mean score of 2.4 indicated
that respondents rejected that intrusion detection system assit expertsin ensuring
25
security of the wireless network. The mean score of 3.32 reveals acceptance of the
network. The mean score of 2.92 show that the respondents accept that intrusion
intrude into the network. The mean score of 2.96 reveal acceptance that data from
configuration systems. The average mean, when calculated, gave a value of 2.88,
which is above the cut off mark of 2.5 for which we accept that intrusion detection
26
8. WIDS has reduced the risk of 7 7 10 1 25 2.8 Accept
unauthorized manipulation of
28 21 20 1 70
data/resources within the network
9. WIDS has increased ready availability 3 6 9 7 25 2.2 Reject
of data/resources
12 18 18 7 55
10. WIDS has made it easier for 5 6 7 7 25 2.36 Reject
legitimate users to access
20 18 14 7 59
data/resources appropriately.
3.0+3.24+2.8+2.2+2.36 13.76
Average mean score = = = 2.75 = 2.8
5 5
Table 4.2 above contains items 6-10 with mean scores of 3.0, 3.24, 2.8, 2.2 and 2.36
respectively. Mean score of 3.0 shows that the use of Intrusion Detection System has
increased security in the wireless network by detecting and preventing intrusion into
the network. The mean score of 3.24 shows that Intrusion Detection System has
2.8 reveals acceptance of the respondent that Intrusion Detection System has reduced
mean score of 2.2 shows that the respondents reject that Intrusion Detection System
has increased ready availability of data/resources and the mean score of 2.36 shows
rejection of the respondents that Intrusion Detection System has made it easier for
2.8 is above the cut off mark of 2.5, therefore, it is accepted that intrusion detection
27
system shave security impact on network in Alvan Ikoku Federal College of
Education.
Centre
28
2.8+2.4+2.44+3.2+2.88 13.72
Average mean score = 5
= 5
= 2.74
Table 4.3 above contains 5 items, 11-15 with mean scores of 2.8, 2.4, 2.44, 3.2 and
2.88 respectively. The mean score of 2.8 shows that the respondent accept that there
are trained personnel in the ICT resource centre that administrate the wireless
network using intrusion detection tools. The mean score of 2.4 shows rejection by
the respondents that the ICT centre uses Snort as one of its network Intrusion
Detection tools. The mean score of 2.44 shows that the respondents rejected that the
ICT resource centre network administrators use Analysis tools like ELSA, Squert,
Squid for network Performance Analysis. The mean score of 3.2 shows that the
respondents accept that the ICT resource centre uses Host based monitors to check
for files, file systems, logs, etc. in order to detect suspicious activity in the network.
The mean score of 2.88 reveals acceptance by the respondents that the ICT resource
centre uses network monitors to ascertain the network performance and monitor
traffic. The average mean value of 2.74 is greater than the cut off mark of 2.5,
wireless network in Alvan Ikoku Federal College of Education ICT Resource Centre.
29
CHAPTER FIVE
DISCUSSION OF FINDINGS, EDUCATIONAL IMPLICATION,
CONCLUSION, RECOMMENDATION, LIMITATION OF THE STUDY,
SUGGESTIONS FOR FURTHER STUDIES AND SUMMARY
Discussion of Findings
The findings of research work through the data collected and analysed in chapter
four are interpreted and discussed one after the other in the chapter. Conclusion is
drawn based on the interpretations. The educational implication of the study,
recommendations and limitation of the study are also presented.
From the data collected ad analysed in table 4.1, t shows that wireless intrusion
detection is of importance to the network. It was accepted that it assists experts in
ensuring security of the wireless network, it prevents unauthorized access to a
network, it alerts network administrators in the case of suspected attempt to intrude
into the network due to mean scores of 2.8, 3.32, 2.92 and 2.96 respectively. It was
further rejected that it boosts the efficiency of a network due to the mean score of
2.4 which is below the average mean value of 2.5
Research Question Two: what are the security impacts of wireless intrusion
detection systems on Network in Alvan Ikoku Federal College of Education?
From the analysis o data in table 4.2, it was accepted that the use of wireless intrusion
detection system has increased security of in the wireless network by detecting or
preventing intrusion into the wireless network. Wireless intrusion detection system
has increased confidentiality of data/resources within the network, wireless intrusion
detection system has reduced risk of unauthorized manipulation of data/resources
30
within the network with mean scores of 3.0, 3.24 and 2.8 respectively. It was rejected
that wireless intrusion detection system has increased ready availability of resources
and that wireless intrusion detection system has made it easier for legitimate users
to access data/resources appropriately, with mean scores of 2.2 and 2.36
respectively, which are below the average mean value of 2.5.
From the analysis of data from table 4.3, it shows that the ICT resource centre has
trained personnel and staff that administrate the wireless network using intrusion
detection tools which was accepted, having a mean of 2.8, it was rejected that the
ICT resource centre uses Snort as one of its network intrusion detection tools, having
a mean score of 2.4. it was also rejected that the ICT resource centre network
administrators use Analysis tools like ELSA, Squert, Sguil, etc for network
performance analysis due to a mean score of 2.44. it was further accepted that the
ICT resource centre uses Host Based monitors to check for files, file systems, logs,
etc. in order to detect suspicious activity in the network and that the ICT resource
centre and monitor traffic, having mean scores of 3.2 and 2.88 respectively.
31
• Wireless Network administrators should be available to administer wireless
intrusion detection systems on the network.
• There should be regular checks on the wireless intrusion detection system to
attend to alerts of activity.
• There should be frequent analysis of the data from wireless intrusion detection
system to check for the performance of the network.
• All nodes in the network should have host based monitors in order to increase
network security and ensure validity and confidentiality of student-related or
school-related data/resources in the network.
Recommendation
• There should be provision of wireless intrusion systems across the ICT to
monitor and secure student and other related files and data.
• Network administrators should be trained regularly and kept abreast of
contemporary intrusion detection tools
• Wireless intrusion detection tools should be updated regularly so as to
improve and keep up with contemporary wireless security.
• All computers/nodes used within the school that has its source from the central
wireless local area network should have host-based monitors installed into
them, to avoid introduction of foreign materials like viruses into the network
or eavesdropping into the institution’s confidential files/resources.
32
Limitation of the Study
In carrying out this study, certain challenges militated against swift execution of the
research work. The respondents were very busy staff of the ICT/MIS Unit and had
little or no time to spare to attend to the questionnaires though they finally did,
though some were very reluctant. Financial constraints were also encountered.
Summary
The research intended to evaluate intrusion detection system for higher education
institution’s wireless local area network. In carrying out the research work, three (3)
research questions were adopted with the target population being all staff from the
ICT/MIS Unit. Simple mean score was used for the data analysis.
Within the limited resources at the researchers’ disposal, the research was carried
out intensively on the ICT Resource Centre/MIS Unit of the College and it was found
out from the research that intrusion detection systems are of importance to higher
education institutions’ wireless local area network.
33
REFERENCES
Al-Janabi S. and Alshourbaji I. (2017) Intrusion Detection and Prevention Systems.
Kurdistan Journal for Applied Research, Volume 2, Issue 3, August 2017.
Animesh Patcha and Jung-Min Park (2006) A Game Theoretic Formulation for
Intrusion Detection in Mobile Ad Network. International Journal of Network
Security, Vol. 2, NO. 2, Pp. 131-, Mar. 2006 (http://isrc.nchu.edu.tw/ijns/)
Bacci G., Lasaulce S., Saad, W., & Sanguinetti L. (2015). Game Theory for
Networks: A tutorial on game-theoretic tools for emerging signal processing
applications. IEEE Signal Processing Society ieeexplore.ieee.org/document
/7366693.
Huang, M.Y., Jasper, R.J., (1999) A Large Scale Distributed Intrusion Detection
Framework based on Attack Strategy Analysis, Computer Networks, pp. 2465-2475.
Kachirsk, O., Guha, R., “Effective Intrusion Detection using Multiple Sensors”,
Proceedings of the 36th Hawaii International Conference on System Sciences – 2003
in Wireless Ad Hoc Networks.
Liang, X. and Xiao Y. (2013) Game Theory for Network Security. IEEE
Communications Surveys & Tutorials, vol. 15 No. 1
34
Patil, M. R., Patil, M R. and Ramakrishnan K.V. (2009) Techniques of Wireless
Intrusion Detection System: T-WIDZ. Computer Science and Engineering
Department, BHSFGC Vijaya College, Bangakore, India.
Sardar, T. H., Ansari Z., Khan A. (2014) A Methodology for Wireless Intrusion
Detection System. Internal Journal of Computer Applications (0975-8887).
International Conference on Information and Communication Technologies (ICIT-
2014).
Wikipedia:en.m.wikipedia.org/wiki/Alvan_Ikoku_Federal_College_of_Education.
35