Substantiating Security Threats Using Different Views of Wireless Network Traces

نویسندگان

  • Elankayer Sithirasenan
  • Vallipuram Muthukkumarasamy
  • Sunil John Mathews
چکیده

Huge amounts of network traces can be collected from today’s busy computer networks for various analysis. These traces could be used to detect intruders and other unusual events. Real time detection of outliers from large data sets can lead to effective intrusion detection and prevention. Presently, due to lack of fast on-the-fly updating and processing capabilities intrusion detection systems (IDSs) do not detect intruders instantly. Furthermore, most IDSs cannot adapt their detection mechanism in real time to accommodate legitimate dynamic changes. Achieving dynamic adaptation in real time has been a long standing desire for effective intrusion detection and prevention. Organizations which heavily rely on network activities are in need of an IDS that could detect intruders in advance and stop them before they could cause chaos. In this context we propose a novel mechanism to detect intruders in wireless LANs. Our system monitors for timing and behavioral anomalies and uses outlier based data association techniques to substantiate the anomaly. In this paper we introduce the concept of views and their use in substantiating security threats. We have tested our concept on data captured from our experimental wireless network environment. The results are analyzed and reported here.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Substantiating Anomalies In Wireless Networks Using Group Outlier Scores

Huge amounts of network traces can be collected from today’s busy computer networks. Analyzing these traces could pave the way to detect unusual conditions and/or other anomalies. Presently, due to the lack of effective substantiating mechanisms intrusion detection systems often exhibit numerous false positives or negatives. The efficiency of a network intrusion detection system (NIDS) depends ...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL

With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. Nevertheless, fresh security threats are emerging often ...

متن کامل

Security in Wireless Sensor Network: Approaches and Issues

Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using...

متن کامل

Wireless Network Security MAIN THREATS AT DIFFERENT LAYERS

A Wireless Network is a wireless communication system that allows computers and workstations to communicate and exchange data with each other using electromagnetic waves as the transmission medium. WLAN is commonly referred to as “Wi-Fi” (wireless fidelity). Wireless local area networks give freedom to one move their wireless devices from one place to other within their offices and organization...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007