DDoS attack detection in IEEE 802.16 based networks

被引:0
|
作者
Maryam Shojaei
Naser Movahhedinia
Behrouz Tork Ladani
机构
[1] University of Isfahan Hezarjarib,Department of Computer Engineering
来源
Wireless Networks | 2014年 / 20卷
关键词
IEEE 802.16; ART1 artificial neural network; Security; Initial network entry; RNG-REQ message;
D O I
暂无
中图分类号
学科分类号
摘要
Achieving high data rate transmission, WiMAX has acquired noticeable attention by communication industry. One of the vulnerabilities of the WiMAX network which leads to DDoS attack is sending a high volume of ranging request messages to base station (BS) in the initial network entry process. In the initial network entry process, BS and subscriber station (SS) exchange management messages. Since some of these messages are not authenticated, malicious SSs can attack the network by exploiting this vulnerability which may increase the traffic load of the BS and prevent it from serving the SSs. So, detecting such attacks is one of the most important issues in such networks. In this research, an artificial neural network (ANN) based approach is proposed in order to detect DDoS attacks in IEEE 802.16 networks. Although lots of studies have been devoted to the detection of DDoS attack, some of them focus just on some statistical features of the traffic and some other focus on packets’ headers. The proposed approach exploits both qualitative and quantitative methods. It detects the attack by feeding some features of the network traffic under attack to an appropriate ANN structure. To evaluate the method, first a typical attacked network is implemented in OPNet simulator, and then by using the proposed system, the efficiency of the method is evaluated. The results show that by choosing suitable time series we can classify 93 % of normal traffic and 91 % of attack traffic.
引用
收藏
页码:2543 / 2559
页数:16
相关论文
共 50 条
  • [21] DDoS Attack Detection in Software Defined Networks by Various Metrics
    Saadallah N.R.
    Al-Talib S.A.A.
    Malallah F.L.
    Recent Patents on Engineering, 2022, 16 (02)
  • [22] Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
    Alhasawi, Yaser
    Alghamdi, Salem
    IEEE ACCESS, 2024, 12 : 42357 - 42368
  • [23] Spatial reuse in IEEE 802.16 based wireless mesh networks
    Fu, LQ
    Cao, ZG
    Fan, PY
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1311 - 1314
  • [24] Conflict Improvement Methods Based on IEEE 802.16 Mesh Networks
    Wang, Ruyan
    Chen, Liang
    Li, Yun
    Liu, Zhanjun
    Wang, Ping
    ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 165 - +
  • [25] Service Differentiation in OFDM-Based IEEE 802.16 Networks
    Zhou, Yi
    Chen, Kai
    He, Jianhua
    Guan, Haibin
    Zhang, Yan
    Liang, Alei
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [26] Design and planning of IEEE 802.16 networks
    Marques, Marco
    Ambrosio, Joao
    Reis, Carlos
    Gouveia, David
    Riscado, Jose
    Robalo, Daniel
    Velez, Fernando J.
    Costa, Rui
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2849 - +
  • [27] A MSPCA based Intrusion Detection Algorithm for Detection of DDoS Attack
    Chen, Zhaomin
    Yeo, Chai Kiat
    Francis, Bu Sung Lee
    Lau, Chiew Tong
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [28] DDoS attack detection algorithms based on entropy computing
    Li, Liying
    Zhou, Jianying
    Xiao, Ning
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 452 - +
  • [29] A DDoS Attack Detection System Based on Spark Framework
    Han, Dezhi
    Bi, Kun
    Liu, Han
    Jia, Jianxin
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2017, 14 (03) : 769 - 788
  • [30] User Behaviour Modelling Based DDoS Attack Detection
    Cepheli, Ozge
    Buyukcorak, Saliba
    Kurt, Gunes Karabulut
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 2186 - 2189