by:
Batch No: A3 Radhika. Ch Bhargavi. K SaiDeepthi. K RamyaSri. Ch
CONTENTS
o
Abstract
o
o
Necessity
Existing System
o
o o o o
Problem Statement
Solution Strategy Proposed System System Requirement Specifications Limitations
2
ABSTRACT
Intrusion detection plays an important role in the area of security in WSN. Detection of any type of intruder is essential in case of WSN. WSN consumes a lot of energy to detect an intruder.
Therefore we derive an algorithm for energy efficient external and internal intrusion detection.
We also analyze the probability of detecting the intruder for heterogeneous WSN. It considers single sensing and multi sensing intruder detection models.
3
NECESSITY
EXISTING SYSTEM
In single-sensing detection, at a time only one intruder detected by the WSN. Our Previous work was according to homogeneous heterogeneous single sensor in wireless sensor network. and
DISADVANTAGES:
So that there is no guarantee for our information that has been sent 5 securely. Data will not routed if primary detector fails.
PROBLEM STATEMENT
The life span of wireless sensor network directly depends on the power. The power required to transfer a data from sensor is more compared to its internal processing. All sensors are performing the intrusion detection and passing this information to base station may cause unnecessary usage of power.
It is better to activate only few sensors within a region of WSN at a time for intrusion detection.
6
SOLUTION STRATEGY
which is a fake network that serves to attract the attackers so that you
can track their activities without exposing your real networks.
The "honey pot" appears to hackers, to be a part of your real network, whereas it is in fact isolated so that the hackers who break into it cannot reach the rest of your network.
Businesses can monitor the "honey pot" so that they can detect any intrusions early on and track them back to the hackers. 7
PROPOSED SYSTEM
In Heterogeneous wireless sensor ,Intruder detected anywhere in the network. We are detecting the intruder in multiple heterogeneous wireless sensor networks. ADVANTAGES:
If primary detector fails another detector detect the intruder. By finding the intruders we can send our information in a secured manner. 8
: Windows XP : Java
HARDWARE REQUIREMENTS:
LIMITATIONS
limit
an
Intrusion
detection
system's
Bad packets generated from software bugs, corrupt DNS data, and local packets that escaped can create a significantly high false-alarm rate. It is common for the number of real attacks to be far below the falsealarm rate.
10
THANK YOU
11
QUERIES?
12