首页> 外文学位 >An anomaly behavior analysis intrusion detection system for wireless networks.
【24h】

An anomaly behavior analysis intrusion detection system for wireless networks.

机译:用于无线网络的异常行为分析入侵检测系统。

获取原文
获取原文并翻译 | 示例

摘要

Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a larger network like the Internet via wireless communications. One widely used wireless communication standard is the IEEE 802.11 protocol, popularly called Wi-Fi. Over the years, the 802.11 has been upgraded to different versions. But most of these upgrades have been focused on the improvement of the throughput of the protocol and not enhancing the security of the protocol, thus leaving the protocol vulnerable to attacks. The goal of this research is to develop and implement an intrusion detection system based on anomaly behavior analysis that can detect accurately attacks on the Wi-Fi networks and track the location of the attacker.;As a part of this thesis we present two architectures to develop an anomaly based intrusion detection system for single access point and distributed Wi-Fi networks. These architectures can detect attacks on Wi-Finetworks, classify the attacks and track the location of the attacker once the attack has been detected. The system uses statistical and probability techniques associated with temporal wireless protocol transitions, that we refer to as Wireless Flows (Wflows). The Wflows are modeled and stored as a sequence of n-grams within a given period of analysis. We studied two approaches to track the location of the attacker. In the first approach, we use a clustering approach to generate power maps that can be used to track the location of the user accessing the Wi-Fi network. In the second approach, we use classification algorithms to track the location of the user from a Central Controller Unit. Experimental results show that the attack detection and classification algorithms generate no false positives and no false negatives even when the Wi-Fi network has high frame drop rates. The Clustering approach for location tracking was found to perform highly accurate in static environments (81% accuracy) but the performance rapidly deteriorates with the changes in the environment. While the classification algorithm to track the location of the user at the Central Controller/RADIUS server was seen to perform with lesser accuracy then the clustering approach(76% accuracy) but the system's ability to track the location of the user deteriorated less rapidly with changes in the operating environment.
机译:无线网络已变得无处不在,其中各种各样的移动设备通过无线通信连接到较大的网络(如Internet)。一种广泛使用的无线通信标准是IEEE 802.11协议,通常称为Wi-Fi。多年来,802.11已升级到不同版本。但是这些升级中的大多数都集中在提高协议吞吐量上,而不是提高协议的安全性,因此使协议容易受到攻击。这项研究的目的是开发和实现基于异常行为分析的入侵检测系统,该系统可以准确地检测Wi-Fi网络上的攻击并跟踪攻击者的位置。为单接入点和分布式Wi-Fi网络开发基于异常的入侵检测系统。这些架构可以检测到Wi-Fi网络上的攻击,对攻击进行分类,并在检测到攻击后跟踪攻击者的位置。该系统使用与临时无线协议转换相关的统计和概率技术,我们将其称为无线流(Wflow)。在给定的分析期间内,将Wflow建模并存储为n克序列。我们研究了两种跟踪攻击者位置的方法。在第一种方法中,我们使用聚类方法生成功率图,该功率图可用于跟踪访问Wi-Fi网络的用户的位置。在第二种方法中,我们使用分类算法从中央控制器单元跟踪用户的位置。实验结果表明,即使Wi-Fi网络丢帧率很高,攻击检测和分类算法也不会产生误报和误报。发现用于位置跟踪的聚类方法在静态环境中具有很高的准确度(准确度为81%),但是性能随着环境的变化而迅速下降。虽然可以看到在中央控制器/ RADIUS服务器上跟踪用户位置的分类算法的准确性较低,但聚类方法(准确性为76%)却随系统变化而降低了系统跟踪用户位置的能力下降的速度较慢在操作环境中。

著录项

  • 作者

    Satam, Pratik.;

  • 作者单位

    The University of Arizona.;

  • 授予单位 The University of Arizona.;
  • 学科 Computer engineering.
  • 学位 M.S.
  • 年度 2015
  • 页码 96 p.
  • 总页数 96
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号