Visualization assisted detection of sybil attacks in wireless networks

  • Authors:
  • Weichao Wang;Aidong Lu

  • Affiliations:
  • University of Kansas;University of North Carolina at Charlotte

  • Venue:
  • Proceedings of the 3rd international workshop on Visualization for computer security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In wireless networks,the authenticity and uniqueness of node identities are essential to the fundamental operations such as routing, resource allocation, and intrusion detection. In this paper, we investigate Sybil attack, an attack in which a malicious node illegitimately acquires multiple identities and performs as these nodes simultaneously. We propose an effective approach to monitoring and detecting such attacks by integrating network security and visualization methods. The security component explores the time-varying network topology and its statistical and geometry information to detect the existence of Sybil attacks. The visualization component incorporates the detection results and provides an effective mechanism to illustrate abnormal topology patterns and locate fake identities. These two components are integrated into a practical system that takes advantage of both interactive visualization and intelligent security methods. Experimental studies are conducted to investigate the impacts of the network parameters such as node connectivity on the detection capability of the proposed mechanism.