802.11 Wireless Access Point Usage Simulation and Anomaly Detection
نویسندگان
چکیده
Despite the growing popularity of 802.11 wireless networks in many public places, wireless users often suffer from connectivity problems due to unstable radio conditions and dynamic user behavior among other reasons. Detecting the anomalous cases and planning to prevent such problems in advance are in the thick of major challenges that network managers encounter. Complication of monitoring such complex networks, that often requires heavy instrumentation of the user devices, makes the anomaly detection analysis even harder. In this paper we exploit 802.11 access point usage data and propose an anomaly detection technique based on Hidden Markov Models and on data that is inexpensive to obtain. We subsequently validate the proposed model by generating a number of network anomalous scenarios in OMNeT++/INET network simulator and evaluate the detection method against baseline approach (Raw Data and PCA) results. The experimental outcomes show the superiority of the proposed HMM model in detection precision and sensitivity.
منابع مشابه
Providing air-time usage fairness in IEEE 802.11 networks with the deficit transmission time (DTT) scheduler
Wireless systems based on the IEEE 802.11 standard are known to suffer a performance degradation when just a single station in the network experiences bad channel conditions toward the Access Point (AP). This phenomenon, known as the “performance anomaly”, is mainly due to the max-min throughput fairness of the CSMA/CA algorithm of the 802.11 MAC. The simple FIFO scheduling policy usually imple...
متن کاملRogue Access Point Detection Using Innate Characteristics of the 802.11 MAC
Attacks on wireless networks can be classified into two categories: external wireless and internal wired. In external wireless attacks, an attacker uses a wireless device to target the access point (AP), other wireless nodes or the communications on the network. In internal wired attacks, an attacker or authorized insider inserts an unauthorized (or rogue) AP into the wired backbone for malicio...
متن کاملThe MUM Middleware to Counteract IEEE 802.11 Performance Anomaly in Context-aware Multimedia Provisioning
Multimedia provisioning over Wi-Fi networks is a complex task that should consider also novel issues stemming from the specific behavior of IEEE 802.11 protocols. In particular, we claim the need for visibility of context data about the IEEE 802.11 performance anomaly, i.e., the situation where even a single node located at the borders of the coverage area of a Wi-Fi access point produces a rel...
متن کاملEfficient Hybrid Network (Wired and Wireless) Intrusion Detection using Statistical Data Streams and Detection of Clustered Alerts
Problem statement: Wireless LAN IEEE 802.11 protocols are growing rapidly and security has always been a concern with the security of wired network. Wireless networks encountered threats from unauthorized access to network resources, installation of access points and illegal sniffing (refer as classical intrusion threats). In its current hybrid wired and wireless network attacks on the generall...
متن کاملA Cross-Layer Approach for Mitigating 802.11 MAC Anomaly Using SNR to Control Backoff Contention Windows
The standard 802.11 presents a Medium Access Control (MAC) anomaly when stations with different data rates operate at the same Access Point. This paper presents a strategy for using SNR to control the contention window and consequently mitigate the anomaly. Simulations using Network Simulators (NS) are presented to demonstrate the anomaly and to evaluate the mitigation anomaly strategy. The str...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1707.02933 شماره
صفحات -
تاریخ انتشار 2017