Anomaly-based protection approach against wireless network attacks

被引:0
|
作者
Fayssal, Samer [1 ]
Hariri, Salim [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing deployment of Wireless Networks has experienced also an exponential increase in wireless faults vulnerabilities and attacks. In this paper, we present a wireless self-protection system (WSPS) that has the following significant features: online monitor of the behavior of wireless network, generate relevant network features, track wireless network state machine violations, generate wireless flow keys (WFK), and use the dynamically updated anomaly and misuse rules to detect complex known and unknown wireless attacks. WSPS quantifies the attack impact using the abnormality distance from the baseline normal models. We validate the WSPS approach by experimenting with different wireless attacks, and show that WSPS can detect accurately wireless network attacks and proactively protect against these attacks.
引用
收藏
页码:193 / 195
页数:3
相关论文
共 50 条
  • [21] An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
    Karimazad, Reyhaneh
    Faraahi, Ahmad
    NETWORK AND ELECTRONICS ENGINEERING, 2011, 11 : 44 - 48
  • [22] An anomaly-based approach for cyber-physical threat detection using network and sensor data
    Canonico, Roberto
    Esposito, Giovanni
    Navarro, Annalisa
    Romano, Simon Pietro
    Sperli, Giancarlo
    Vignali, Andrea
    COMPUTER COMMUNICATIONS, 2025, 234
  • [23] Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection
    Fragkiadakis, Alexandros G.
    Siris, Vasilios A.
    Petroulakis, Nikolaos E.
    Traganitis, Apostolos P.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (02): : 276 - 294
  • [24] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [25] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [26] Analysis of anomaly-based intrusion detection techniques for mobile wireless networks
    Liu, Lijun
    Ma, Hongxia
    Liu, Jianqiu
    Li, Zhuowei
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 827 - 832
  • [27] A Deep Learning Approach for Anomaly-Based Network Intrusion Detection Systems: A Survey and an Objective Comparison
    Kumar, Shailender
    Jha, Namrata
    Sachdeva, Nikhil
    MACHINE LEARNING AND BIG DATA ANALYTICS (PROCEEDINGS OF INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND BIG DATA ANALYTICS (ICMLBDA) 2021), 2022, 256 : 227 - 235
  • [28] Accelerating anomaly-based IDS using Neural Network on GPU
    Nguyen Thi Thanh Van
    Tran Ngoc Thinh
    2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 67 - 74
  • [29] An anomaly-based approach to the analysis of the social behavior of VoIP users
    Chiappetta, S.
    Mazzariello, C.
    Presta, R.
    Romano, S. P.
    COMPUTER NETWORKS, 2013, 57 (06) : 1545 - 1559
  • [30] An anomaly-based approach for DDoS attack detection in cloud environment
    Rawashdeh, Adnan
    Alkasassbeh, Mouhammd
    Al-Hawawreh, Muna
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) : 312 - 324