Anomaly-based protection approach against wireless network attacks

被引:0
|
作者
Fayssal, Samer [1 ]
Hariri, Salim [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing deployment of Wireless Networks has experienced also an exponential increase in wireless faults vulnerabilities and attacks. In this paper, we present a wireless self-protection system (WSPS) that has the following significant features: online monitor of the behavior of wireless network, generate relevant network features, track wireless network state machine violations, generate wireless flow keys (WFK), and use the dynamically updated anomaly and misuse rules to detect complex known and unknown wireless attacks. WSPS quantifies the attack impact using the abnormality distance from the baseline normal models. We validate the WSPS approach by experimenting with different wireless attacks, and show that WSPS can detect accurately wireless network attacks and proactively protect against these attacks.
引用
收藏
页码:193 / 195
页数:3
相关论文
共 50 条
  • [41] DESIGN AND IMPLEMENTATION OF AN ANOMALY-BASED INTRUSION DETECTION SYSTEM FOR WIRELESS INDUSTRIAL NETWORKS
    Wei, Min
    Kim, Keecheon
    Wang, Ping
    FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 879 - 886
  • [42] Proposals on assessment environments for anomaly-based network intrusion detection systems
    Bermudez-Edo, M.
    Salazar-Hernandez, R.
    Diaz-Verdejo, J.
    Garcia-Teodoro, P.
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 210 - +
  • [43] An Approach of DNS Protection Against DDoS Attacks
    Georgiev, Ivan
    Nikolova, Kamelia
    2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), 2017, : 140 - 143
  • [44] Profiling Network Traffic Behavior for the purpose of Anomaly-based Intrusion Detection
    Gill, Manmeet Singh
    Lindskog, Dale
    Zavarsky, Pavol
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 885 - 890
  • [45] Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
    Li, Hongda
    Wei, Feng
    Hu, Hongxin
    PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFV '19), 2019, : 13 - 16
  • [46] An anomaly-based Network Intrusion Detection System using Deep learning
    Nguyen Thanh Van
    Tran Ngoc Thinh
    Le Thanh Sach
    2017 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2017, : 210 - 214
  • [47] Active cache based defense against DoS attacks in wireless mesh network
    Santhanam, Lakshmi
    Nandiraju, Deepti
    Nandiraju, Nagesh
    Agrawal, Dharma P.
    2007 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1 AND 2, 2007, : 419 - +
  • [48] An efficient hybrid SVDD/Clustering approach for anomaly-based intrusion detection
    Kenaza, Tayeb
    Bennaceur, Khadidja
    Labed, Abdenour
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 435 - 443
  • [49] Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks
    Kotenko, Igor
    Shorov, Andrey
    Novikova, Evgenia
    PROCEEDINGS OF THE 2013 21ST EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2013, : 526 - 533
  • [50] Swaddler: An approach for the anomaly-based detection of state violations in web applications
    Cova, Marco
    Balzarotti, Davide
    Felmetsger, Viktoria
    Vigna, Giovanni
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2007, 4637 : 63 - +