首页> 外文学位 >A framework for signal strength based intrusion detection system for link layer attacks in wireless network.
【24h】

A framework for signal strength based intrusion detection system for link layer attacks in wireless network.

机译:一种基于信号强度的入侵检测系统框架,用于无线网络中的链路层攻击。

获取原文
获取原文并翻译 | 示例

摘要

Although a wireless local area network is claimed to be as secure as a wired network after the deployment of the WiFi protected access (WPA) protocol, because of unprotected medium access control (MAC) management messages, a WiFi network is vulnerable to low-layer attacks, such as MAC address spoofing, session hijacking, rogue access point (AP) and various lower-layer denial-of-service (DoS) attacks. Since it is proved that the received signal strength (RSS) value of a received packet is strongly related to the physical location of a sender, we designed a RSS-based network intrusion detection system (NIDS) framework for MAC layer attack detection. The fact is that most attacks that exploit MAC layer vulnerabilities can be detected by comparing the location of an attacker with the location of victim nodes. The core of the NIDS framework is a RSS-based localization model. The model is based on the quadratic discriminant analysis (QDA) data mining algorithm. The choice of the QDA algorithm is based on the analysis of a simulation of three data mining algorithms, which are linear discriminant analysis (LDA), QDA, and classification tree.; To solve the relative high error of the RSS-based localization model, which is also the problem of RSS-based localization methods in other researches, we designed an enhancement method based on signalprints. For a network where the separation distance of any neighboring node is larger than 2.4 meters, the enhanced localization model can distinguish each node with nearly zero error.; Our RSS-based NIDS focuses on MAC address spoofing attacks. The detection of MAC spoofing attacks is very important since it protects the network from the further identity-based attacks and MAC layer DoS attacks. The localization capability also can be utilized to take effective action after attacks. For the detection of MAC address spoofing, our simulation shows that the NIDS achieves 99.2 percent true positive rate (TPR), and 0.4 percent false positive rate (FPR) when the separation distance of any neighboring node is larger than 2.4 meters.
机译:尽管据称无线局域网在部署WiFi保护访问(WPA)协议后与有线网络一样安全,但是由于不受保护的媒体访问控制(MAC)管理消息,WiFi网络很容易受到低层攻击攻击,例如MAC地址欺骗,会话劫持,恶意访问点(AP)和各种下层拒绝服务(DoS)攻击。由于已证明接收数据包的接收信号强度(RSS)值与发送方的物理位置密切相关,因此我们设计了基于RSS的网络入侵检测系统(NIDS)框架用于MAC层攻击检测。事实是,可以通过将攻击者的位置与受害者节点的位置进行比较,来检测利用MAC层漏洞的大多数攻击。 NIDS框架的核心是基于RSS的本地化模型。该模型基于二次判别分析(QDA)数据挖掘算法。 QDA算法的选择基于对三种数据挖掘算法的仿真分析,这三种算法分别是线性判别分析(LDA),QDA和分类树。为了解决基于RSS的定位模型相对较高的误差,这也是其他研究中基于RSS的定位方法所存在的问题,我们设计了一种基于信号图的增强方法。对于任何相邻节点的分隔距离大于2.4米的网络,增强的定位模型可以以几乎为零的误差区分每个节点。我们基于RSS的NIDS专注于MAC地址欺骗攻击。 MAC欺骗攻击的检测非常重要,因为它可以保护网络免受进一步的基于身份的攻击和MAC层DoS攻击。定位能力还可以用来在攻击后采取有效措施。对于MAC地址欺骗检测,我们的仿真表明,当任何相邻节点的距离大于2.4米时,NIDS的准确率(TPR)为99.2%,错误率(FPR)为0.4%。

著录项

  • 作者

    Li, Chen Guang.;

  • 作者单位

    Carleton University (Canada).;

  • 授予单位 Carleton University (Canada).;
  • 学科 Computer Science.
  • 学位 M.Sc.
  • 年度 2008
  • 页码 83 p.
  • 总页数 83
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号