A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.
G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar, “A Cross-Layer Based Intrusion Detection Approach for Wireless Ad Hoc Networks,” Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005, p. 861.
Y. Lim, T. Schmoyer, J. Levine and H. L. Owen. “Wireless Intrusion Detection and Response.” Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, 18-20 June 2003, pp. 22-26.
Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Network,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, 6-11 August 2000, pp. 26-31.
W. Xia, J. S. Wong, F. Stanley and S. Basu, “Cross-Layer Based Anomaly Detection in Wireless Mesh Networks,” 9th Annual International Symposium on Applications and the Internet, Bellevue, 20-24 July 2009, pp. 9-15.
J. S. Bal, et al., “A Cross Layer Based Intrusion Detection Technique for Wireless Network,” International Journal of Computer Science and Information Security, Vol. 5, September 2009, Article ID: 25080924.
R. Kaur, “Cross Layer Based Intrusion Detection System for Wireless Domain-Acritical Analysis,” International Journal of Computer Science and Communication, Vol. 2, No. 2 (Accepted for publication), 2011.