Anomaly-based protection approach against wireless network attacks

被引:0
|
作者
Fayssal, Samer [1 ]
Hariri, Salim [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing deployment of Wireless Networks has experienced also an exponential increase in wireless faults vulnerabilities and attacks. In this paper, we present a wireless self-protection system (WSPS) that has the following significant features: online monitor of the behavior of wireless network, generate relevant network features, track wireless network state machine violations, generate wireless flow keys (WFK), and use the dynamically updated anomaly and misuse rules to detect complex known and unknown wireless attacks. WSPS quantifies the attack impact using the abnormality distance from the baseline normal models. We validate the WSPS approach by experimenting with different wireless attacks, and show that WSPS can detect accurately wireless network attacks and proactively protect against these attacks.
引用
收藏
页码:193 / 195
页数:3
相关论文
共 50 条
  • [1] Anomaly-based behavior analysis of wireless network security
    Fayssal, Samer
    Hariri, Salim
    Al-Nashif, Youssif
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 444 - 451
  • [2] Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
    Gurina, Anastasia
    Eliseev, Vladimir
    INFORMATION, 2019, 10 (03)
  • [3] Integrating Anomaly-Based Approach into Bayesian Network Classifiers
    Benferhat, Salem
    Tabia, Karim
    E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 127 - 139
  • [4] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    COMPUTERS & SECURITY, 2014, 46 : 94 - 110
  • [5] Anomaly-based Identification of Large-Scale Attacks
    Gamer, Thomas
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6638 - 6643
  • [6] Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network
    Tufan, Emrah
    Tezcan, Cihangir
    Acarturk, Cengiz
    IEEE ACCESS, 2021, 9 : 50078 - 50092
  • [7] Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks
    Arafah, Mohammad
    Phillips, Iain
    Adnane, Asma
    Hadi, Wael
    Alauthman, Mohammad
    Al-Banna, Abedal-Kareem
    APPLIED SOFT COMPUTING, 2025, 168
  • [8] Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos
    WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 192 - 203
  • [9] ANOMALY-BASED NETWORK INTRUSION DETECTION METHODS
    Nevlud, Pavel
    Bures, Miroslav
    Kapicak, Lukas
    Zdralek, Jaroslav
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 11 (06) : 468 - 474
  • [10] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855