By Topic

A holistic methodology for evaluating wireless Intrusion Detection Systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Khalid Nasr ; IRIT-ENSEEIHT, INPT, Université de Toulouse, France ; Anas Abou El Kalam ; Christian Fraboul

Nowadays, wireless network security has a considerable attention. However, wireless communication faces several security threats. Consequently, several security efforts have been exerted to combat the wireless attacks, but unfortunately complete attack prevention is not realistically attainable. Thus, the emphasis on detecting intrusions through a second line of defense, in the form of Intrusion Detection System (IDS), is increasing. Selecting an effective and appropriate IDS system should take its functionality and performance evaluation into account. Unbiased and reliable evaluation necessarily depends on a well-engineered evaluation methodology. Dealing with this challenge, this paper proposed a holistic methodology for IDSs evaluation in wireless networks. Our methodology includes all necessary and sufficient tasks for IDSs evaluation. Also, we present holistic taxonomies of wireless IDSs and wireless security attacks from the perspective of the IDS evaluator.

Published in:

Network and System Security (NSS), 2011 5th International Conference on

Date of Conference:

6-8 Sept. 2011