Models and Techniques Analysis of Border Intrusion Detection Systems

1
Mosad Alkhathami
Mosad Alkhathami
2
Lubna Alazzawi
Lubna Alazzawi
3
Ali Elkateeb
Ali Elkateeb
1 University of Michigan

Send Message

To: Author

GJRE Volume 15 Issue F7

Article Fingerprint

ReserarchID

47ZL7

Models and Techniques Analysis of Border Intrusion Detection Systems Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

This research paper sets out to explore various border intrusion detection systems but with emphasis on wireless sensor detection method. The system described in this paper relates to the detection of human beings in particular but also offers ways of detecting non-human intruders such as objects and animals. Thus, the study aims at ascertaining the intruder crossing a specified border or perimeter under surveillance before raising an alarm. It also looks forward to provide intrusion detection mechanisms for other forms of objects that are considered to be intruding to a specified perimeter. The application is being developed for border intrusion detection problems that are mainly focused on human and any other intruder. As such, the system will focus on all forms of intrusion including objects. There is also need for an intrusion detection system to ascertain the identity of the intruder.

23 Cites in Articles

References

  1. Dong Kim,Sang Lee,Tae Kim,Jong Park (2012). Quantitative intrusion intensity assessment for intrusion detection systems.
  2. Said Omar,Alaaelnashar (2015). Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments.
  3. G Liu (2014). Intrusion Detection Systems.
  4. L Vokorokos,M Ennert,Z Dudláková,O &fortotira (2014). A Control Node for Intrusion Detection Systems Management.
  5. Shahaboddin Shamshirband,Nor Anuar,Miss Kiah,Ahmed Patel (2013). An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique.
  6. Tarek Sheltami,Abdulsalam Basabaa,Elhadi Shakshuki (2014). A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs.
  7. (2010). Wireless sensor networks for human intruder detection.
  8. Ghalib Absar-Ul-Hasan,Ather Shah,Ali (2010). Intrusion Detection System Using Wireless Sensor Networks.
  9. Mosad Halkhathami,Lubna Alazzawi (2015). Border Security Control via Distributed WSN Technolog.
  10. Osman Hasan,Sofiène Tahar (2015). Formalized Probability Theory and Applications Using Theorem Proving.
  11. Andreas Fuchsberger (2005). Intrusion Detection Systems and Intrusion Prevention Systems.
  12. Saeed Aldosari,José,Moura (2007). Detection in sensor networks: The saddlepoint approximation.
  13. B Barry,H Chan (2010). Architecture And Performance Evaluation Of A Hybrid Intrusion Detection System For IP Telephony.
  14. S Boob,P &jadhav (2010). Wireless Intrusion Detection System.
  15. Tomasz Smolinski,G Mariofanna,Aboul Milanova,Hassanien (2008). Computational Intelligence in Biomedicine and Bioinformatics.
  16. C Cai,L Yuan (2013). Intrusion Detection System Based On Ant Colony System.
  17. Nutan Farah,M Avishek,Faisal Muhammad,Abdur Rahman,Musharrat Rafni,Dewan Md. (2015). Application of Machine Learning Approaches in Intrusion Detection System: A Survey.
  18. L Sindhuja,G Padmavathi (2015). Clone Detection Using Enhanced EDD (EEDD) with Danger Theory in Mobile Wireless Sensor Network.
  19. B Sun,L Osborne,Y Xiao,S Guizani (2007). Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks.
  20. S Janakiraman (2009). An Intelligent Distributed Intrusion Detection System Using Genetic Algorithm.
  21. Dengsheng Zhang,Guojun Lu (2009). A Comparative Study On Shape Retrieval Using Fourier Descriptors With Different Shape Signatures.
  22. M Korcak,J Lamer,F &jakab (2014). Intrusion Prevention/Intrusion Detection System (IPS/IDS) For Wifi Networks.
  23. Wai Wong,Chu Kit,Way Loo,Lim (2013). Omnidirectional Human Intrusion Detection System Using Computer Vision Techniques.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Mosad Alkhathami. 2015. \u201cModels and Techniques Analysis of Border Intrusion Detection Systems\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 15 (GJRE Volume 15 Issue F7): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Keywords
Classification
GJRE-F Classification: FOR Code: 290901p
Version of record

v1.2

Issue date

October 17, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 4161
Total Downloads: 1915
2026 Trends
Research Identity (RIN)
Related Research

Published Article

This research paper sets out to explore various border intrusion detection systems but with emphasis on wireless sensor detection method. The system described in this paper relates to the detection of human beings in particular but also offers ways of detecting non-human intruders such as objects and animals. Thus, the study aims at ascertaining the intruder crossing a specified border or perimeter under surveillance before raising an alarm. It also looks forward to provide intrusion detection mechanisms for other forms of objects that are considered to be intruding to a specified perimeter. The application is being developed for border intrusion detection problems that are mainly focused on human and any other intruder. As such, the system will focus on all forms of intrusion including objects. There is also need for an intrusion detection system to ascertain the identity of the intruder.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Models and Techniques Analysis of Border Intrusion Detection Systems

Mosad Alkhathami
Mosad Alkhathami University of Michigan
Lubna Alazzawi
Lubna Alazzawi
Ali Elkateeb
Ali Elkateeb

Research Journals