Performance Analysis of Wireless Intrusion Detection Systems
نویسندگان
چکیده
Wireless network security has a considerable attention in recent years. Several security efforts have been exerted to combat the wireless attacks, but unfortunately complete attack prevention at the first line of defense such as authentication, encryption, and firewall is not realistically attainable. Thus, the emphasis on detecting wireless attacks at a second line of defense, in the form of Wireless Intrusion Detection System (WIDS), has been growing. Despite the importance of WIDSs in wireless network security, their performance is sometimes not satisfying in practice. Thus, WIDSs performance evaluation is a pressing necessity. By evaluation we mean a systematic assessment for measuring the ability of a WIDS to meet the intended operation and expected performance. In this thesis, we have developed a comprehensive evaluation methodology that covers all necessary dimensions for a credible evaluation of WIDSs performance. The main pivotal tasks in our methodology are characterizing and generating the evaluation dataset, defining expressive evaluation metrics, and circumventing the evaluation limitations. Comprehensive and credible evaluation of WIDSs necessitates taking into account all possible attacks. While this is operationally impossible, it is necessary to select representative attack test cases that can be extracted mainly from a comprehensive classification of wireless attacks. Dealing with this challenge, we have developed a holistic taxonomy of wireless security attacks from the perspective of the WIDS evaluator. The second pivotal task in our methodology is defining expressive evaluation metrics. We introduced a new evaluation metric E_ID (intrusion detection effectiveness) for manipulating the drawbacks of the previously proposed metrics for evaluating the IDSs/ WIDSs effectiveness. As well, we proposed another metric R_R (recognizing rate) for measuring the attack type recognizing attribute. As a third important task, we have circumvented the evaluation limitations, caused by the uncontrolled traffic in the wireless open medium, by constructing a RF shielded testbed to take all measurements under our control without any interfering from any outside uncontrolled traffic. Finally, we followed our methodology and conducted experimental evaluation tests of two popular WIDSs, and demonstrated the utility of our proposed taxonomy of wireless attacks and our developed evaluation metrics (E_ID and R_R), in addition to evaluating the impact of WIDSs on the supervised system resources.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012