Anomaly-based protection approach against wireless network attacks

被引:0
|
作者
Fayssal, Samer [1 ]
Hariri, Salim [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing deployment of Wireless Networks has experienced also an exponential increase in wireless faults vulnerabilities and attacks. In this paper, we present a wireless self-protection system (WSPS) that has the following significant features: online monitor of the behavior of wireless network, generate relevant network features, track wireless network state machine violations, generate wireless flow keys (WFK), and use the dynamically updated anomaly and misuse rules to detect complex known and unknown wireless attacks. WSPS quantifies the attack impact using the abnormality distance from the baseline normal models. We validate the WSPS approach by experimenting with different wireless attacks, and show that WSPS can detect accurately wireless network attacks and proactively protect against these attacks.
引用
收藏
页码:193 / 195
页数:3
相关论文
共 50 条
  • [31] PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS
    Stelte, Bjoern
    2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 53 - 58
  • [32] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement
    Yoda, Kazuki
    Nakamaru, Tomoki
    Akiyama, Soramichi
    Chiba, Shigeru
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 287 - 298
  • [33] Network Protection Against Node Attacks Based on Probabilistic Availability Measures
    Pioro, Michal
    Mycek, Mariusz
    Tomaszewski, Artur
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 2742 - 2763
  • [34] Anomaly-Based Web Attack Detection: A Deep Learning Approach
    Liang, Jingxi
    Zhao, Wen
    Ye, Wei
    PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017), 2017, : 80 - 85
  • [35] An Anomaly-Based Approach for Detecting Modularity Violations on Method Placement
    Yoda, Kazuki
    Nakamaru, Tomoki
    Akiyama, Soramichi
    Chiba, Shigeru
    IEEE International Conference on Software Quality, Reliability and Security, QRS, 2022, 2022-December : 287 - 298
  • [36] An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection
    Xu, Jinghui
    Wen, Yu
    Yang, Chun
    Meng, Dan
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1680 - 1687
  • [37] Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
    Yaser Jararweh
    Haythem A. Bany Salameh
    Abdallah Alturani
    Loai Tawalbeh
    Houbing Song
    Telecommunication Systems, 2018, 67 : 217 - 229
  • [38] Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks
    Jararweh, Yaser
    Salameh, Haythem A. Bany
    Alturani, Abdallah
    Tawalbeh, Loai
    Song, Houbing
    TELECOMMUNICATION SYSTEMS, 2018, 67 (02) : 217 - 229
  • [39] ANOMALY-BASED SPAM FILTERING
    Santos, Igor
    Laorden, Carlos
    Ugarte-Pedrero, Xabier
    Sanz, Borja
    Bringas, Pablo G.
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 5 - 14
  • [40] Unknown Attacks Detection Using Feature Extraction from Anomaly-based IDS Alerts
    Sato, Masaaki
    Yamaki, Hirofumi
    Takakura, Hiroki
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 273 - 277