The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Wireless Security Is Different
Computer
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
ACM SIGOPS Operating Systems Review
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
LAD: Localization Anomaly Detection forWireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
The Final Nail in WEP's Coffin
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Wireless hotspots: petri dish of wireless security
Communications of the ACM - Hacking and innovation
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Anomaly-based Fault Detection System in Distributed System
SERA '07 Proceedings of the 5th ACIS International Conference on Software Engineering Research, Management & Applications
Anomaly-Based Behavior Analysis of Wireless Network Security
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |
Though mobile computing systems constitute the core of the next generation ubiquitous pervasive services, they still have many flaws in their security. This paper describes a novel framework for wireless anomaly based intrusion detection and response system, which is capable of detecting complex malicious attacks. This framework is based on multi-channel online monitoring and analysis of wireless network features with respect to multiple observation time windows. These features are related to Data Link Layer frame behaviors and the mobility of stations. A general purpose wireless self-protection system (WSPS) is presented. WSPS has the following modules: Wireless network probes, Wireless features filtration and generation module, Wireless network flow generator, behavior analysis module, and action module. WSPS self protects against attacks by online monitoring and analyzing anomalies and misuses in the network features, and utilizes the low false alerts of the analysis module. The validation and effectiveness of this framework is carried out by experimenting with more than 20 different types of wireless attacks using Wireless LANs (WLANs). Our experimental results show that our approach can protect from wireless network attacks with average false-positive rate of 2.234%, and average detection rate of 99.13% for all the experimented attacks.