Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security: Android Intrusion Attack on an Arduino Network IDS


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i9.7370

Abstract


The objective of this paper is to present an open source free standalone Network IDS achieved by an ARDUINO YUN board and study its effectiveness. To do this we develop a Python IDS using raw sockets and then we embark it on our board. To assess our IDS response time, we develop an Arduino simulator for intrusion attack. Using this simulator we carry out several attacks and we note the different detection times. To evaluate these detection times we conduct using the same simulator attacks on the same network and in the same conditions but using a software IDS developed with Visual C ++ using the PCAP library. The detection times of the software IDS are compared with those of the standalone IDS. We note that the standalone IDS response times are better than the software IDS
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Android; Arduino; IDS; Intrusion; Network Security

Full Text:

PDF


References


Karen Scarfone, Peter Mell, Guide to Intrusion Detection and Prevention Systems IDPS (NIST. US Departement of Commerce, 2007).
http://dx.doi.org/10.6028/nist.sp.800-94

Adam Hils, Greg Young, Jeremy D'Hoinne, Magic Quadrant for Intrusion Prevention Systems (https://www.gartner.com/doc/2637717/magic-quadrant-intrusion-prevention-systems.fghjg, December 2013).

Arduino, Arduino documentation (http://www.arduino.cc/, 2014).
http://dx.doi.org/10.1002/9781119183716.ch2

WINPCAP, Winpcap documentation (Politecnico di Torino Dsfg, 2002-2005).

Y.SENHAJI, H.MEDROMI, Network Security: Software IDS versus Embedded IDS, International Journal of Emerging Trends & Technology in Computer Science (Volume 4, Issue 4, July-August 2015 ISBN: 2278-6856).

Boriana Ditcheva, Lisa Fowler, Signature-based Intrusion Detection (University of North Carolina at Chapel Hill, 2005).

Rebecca Bace, Peter Mell, NIST Special Publication on Intrusion Detection Systems (Infidel, Inc., Scotts Valley, CA - National Institute of Standards and Technology, 2003).

David Burgermeister, Jonathan Krier, les systèmes de détection d’intrusions (Developpez.com, 2006).

Ciapessoni, E., Cirio, D., Massucco, S., Pitto, A., Silvestro, F., Risk-Based Security and Control Framework for Power System Operation Under Significant Amounts of HVDC-connected Wind Power Generation, (2015) International Review of Electrical Engineering (IREE), 10 (3), pp. 370-380.
http://dx.doi.org/10.15866/iree.v10i3.6042

Smirnov, Y., Halimon, V., Double Layer Gateway Model for Connection Between Production Network and Enterprise Network, (2015) International Review of Automatic Control (IREACO), 8 (1), pp. 44-50.
http://dx.doi.org/10.15866/ireaco.v8i1.4897

Enshaei, M., Mohd Hanapi, Z., Othman, M., A Review: Mobile Ad Hoc Networks Challenges, Attacks, Security, Vulnerability and Routing Protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.
http://dx.doi.org/10.15866/irecap.v4i5.3001

Syai’in, M., Lian, K., Soeprijanto, A., Digital Generator Capability Curve for Improving Optimal Power Flow based on IPSO, (2013) International Review of Electrical Engineering (IREE), 8 (2), pp. 912-919.

Nayak, M., Kasturi, K., Rout, P., Optimal Placement and Sizing of Multiple Capacitors in Radial Distribution Systems Using Modified TLBO Algorithm, (2013) International Review of Automatic Control (IREACO), 6 (6), pp. 701-713.

Kumar, R., Thanushkodi, K., Reconfiguration and Capacitor Placement Using Opposition Based Differential Evolution Algorithm in Power Distribution System, (2013) International Review on Modelling and Simulations (IREMOS), 6 (4), pp. 1233-1239.

Nayak, M., Nayak, C., Distributed Generation Optimal Placement and Sizing to Enhance Power Distribution Network Performance Using MTLBO, (2013) International Review of Electrical Engineering (IREE), 8 (6), pp. 1857-1869.

Shahrazad, M., Zobaa, A., Optimal Allocation of FACTS Devices in Distribution Networks Using Imperialist Competitive Algorithm, (2013) International Review of Electrical Engineering (IREE), 8 (5), pp. 1539-1547.
http://dx.doi.org/10.15866/iree.v8i5.2110

Shankar, T., Shanmugavel, S., Karthikeyan, A., Modified Harmony Search Algorithm for Energy Optimization in WSN, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (4), pp. 214-220.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize