【24h】

Anomaly Based Wi-Fi Intrusion Detection System

机译:基于异常的Wi-Fi入侵检测系统

获取原文

摘要

The omnipresence of mobile devices and the great need to remain connected has brought to the forefront, the ever-growing need for wireless networks. This unprecedented growth of wireless networks and their use has resulted in an era where, the security of wireless networks has become a necessity. Currently the security methods to protect the Wi-Fi are based on the use of cryptography techniques to protect the data. But these methods fail to address the issue of availability of the service (against DOS), or Integrity (against Mac address spoofing). As a part of this Ph.D research, I present two architectures to develop an anomaly based intrusion detection system for single access point and distributed Wi-Fi networks. These architectures can detect attacks on Wi-Fi networks, classify the attacks and track the location of the attacker once the attack has been detected. The system uses statistical and probability techniques associated with temporal wireless protocol transitions, that we refer to as Wireless Flows (Wflows). The Wflows are modeled and stored as a sequence of n-grams within a given period of time. We studied two approaches to track the location of the attacker. In the first approach, we use a clustering approach to generate power maps that can be used to track the location of the user accessing the Wi-Fi network. In the second approach, we use classification algorithms to track the location of the user from a Central Controller Unit. Experimental results show that the attack detection and classification algorithms generate no false positives and no false negatives even when the Wi-Fi network has high frame drop rates. The Clustering approach for location tracking was found to perform highly accurate in static environments (81% accuracy) but the performance rapidly deteriorates with the changes in the environment. While the classification algorithm to track the location of the user at the Central Controller/RADIUS server was seen to perform with lesser accu
机译:移动设备的无所不能和保持连接的巨大需求已经带到了最前沿,这是对无线网络的不断增长的需求。这种前所未有的无线网络增长及其使用导致了一个时代,无线网络的安全性已成为必需品。目前保护Wi-Fi的安全方法基于使用密码技术来保护数据。但这些方法未能解决服务的可用性(针对DOS),或完整性(针对MAC地址欺骗)。作为这项博士学位研究的一部分,我展示了两种架构,用于开发基于异常的入侵检测系统,用于单个接入点和分布式Wi-Fi网络。这些架构可以检测对Wi-Fi网络的攻击,分类攻击并在检测到攻击后跟踪攻击者的位置。系统使用与时间无线协议转换相关联的统计和概率技术,我们将其称为无线流(WFLOWS)。在给定的时间段内,将WLOWS建模并作为一系列n-gram存储。我们研究了两种方法来跟踪攻击者的位置。在第一种方法中,我们使用聚类方法来生成可用于跟踪访问Wi-Fi网络的用户位置的功率映射。在第二种方法中,我们使用分类算法来跟踪来自中央控制器单元的用户的位置。实验结果表明,即使Wi-Fi网络具有高帧径流,攻击检测和分类算法也不会产生误报,也不会产生假否定。发现位置跟踪的聚类方法在静态环境中高度准确(81%的精度),但性能随着环境的变化而迅速恶化。虽然在中央控制器/ RADIUS服务器上跟踪用户在中央控制器/ RADIUS服务器的分类算法进行较小的ACCU

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号