A Hybrid Intrusion Detection System for Virtual Jamming Attacks on Wireless Networks

Published on Oct 1, 2017in Measurement3.927
· DOI :10.1016/J.MEASUREMENT.2017.05.034
Diego Santoro3
Estimated H-index: 3
(University of Naples Federico II),
Gines Escudero-Andreu1
Estimated H-index: 1
(Lboro: Loughborough University)
+ 3 AuthorsMichele Vadursi17
Estimated H-index: 17
(University of Naples Federico II)
Sources
Abstract
Wireless communications are vulnerable to certain number of cyber-attacks and intrusion attempts due to the intrinsic openness of the communication channel. Virtual jamming attack stands out among other attacks. This type of attack is easy to implement, energy-efficient to be launched, and represents one of the most important threats to the security of wireless networks. As the complexity of the attacks keeps increasing, new and more robust detection mechanisms need to be developed. A number of Network Intrusion Detection Systems (NIDSs) have been presented in the literature to detect this type of attack. To tackle the problem of virtual jamming attacks on IEEE 802.11 networks, we present a novel Hybrid-NIDS (H-NIDS) based on Dempster-Shafer (DS) Theory of Evidence. The proposed method aims at combining the advantages of signature-based and anomaly-based NIDSs. The performance of the proposed solution has been experimentally evaluated with multiple scenarios in an IEEE 802.11 network.
Figures & Tables
Download
📖 Papers frequently viewed together
2017
References29
Newest
#1Gines Escudero-Andreu (Lboro: Loughborough University)H-Index: 1
#2Konstantinos G. Kyriakopoulos (Lboro: Loughborough University)H-Index: 11
Last. Michele Vadursi (University of Naples Federico II)H-Index: 17
view all 6 authors...
Wireless communications are potentially exposed to jamming due to the openness of the medium and, in particular, to virtual jamming, which allows more energy-efficient attacks. In this paper we tackle the problem of virtual jamming attacks on IEEE 802.11 networks and present a data fusion solution for the detection of a type of virtual jamming attack (namely, NAV attacks), based on the real-time monitoring of a set of metrics. The detection performance is evaluated in a number of real scenarios.
Source
#1Olga Galinina (TUT: Tampere University of Technology)H-Index: 19
#2Alexander Pyattaev (TUT: Tampere University of Technology)H-Index: 16
Last. Yevgeni Koucheryavy (TUT: Tampere University of Technology)H-Index: 50
view all 5 authors...
The ongoing densification of small cells yields an unprecedented paradigm shift in user experience and network design. The most notable change comes from cellular rates being comparable to next-generation WiFi systems. Cellular-to-WiFi offloading, the standard modus operandi of recent years, is therefore shifting towards a true integration of both technology families. Users in future 5G systems will thus likely be able to use 3GPP, IEEE, and other technologies simultaneously, so as to maximize t...
Source
#1Alexandros Fragkiadakis (FORTH: Foundation for Research & Technology – Hellas)H-Index: 13
#2Vasilios A. Siris (FORTH: Foundation for Research & Technology – Hellas)H-Index: 23
Last. Apostolos Traganitis (FORTH: Foundation for Research & Technology – Hellas)H-Index: 16
view all 4 authors...
We present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. We compare the performance of local algorithms on the basis of the signal-to-interference-plus-noise ratio SINR executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algorithms. The local algorithms fall into two categories: simple threshold that raise an alarm if the output of the SINR-based metrics we consider deviates...
Source
#1Leonardo Montecchi (UniFI: University of Florence)H-Index: 10
#2Nicola Nostro (UniFI: University of Florence)H-Index: 6
Last. Andrea Bondavalli (UniFI: University of Florence)H-Index: 26
view all 6 authors...
Abstract Current ICT infrastructures are characterized by increasing requirements of reliability, security, performance, availability, adaptability. A relevant issue is represented by the scalability of the system with respect to the increasing number of users and applications, thus requiring a careful dimensioning of resources. Furthermore, new security issues to be faced arise from exposing applications and data to the Internet, thus requiring an attentive analysis of potential threats and the...
Source
#1Nicola Nostro (UniFI: University of Florence)H-Index: 6
#2Andrea Ceccarelli (UniFI: University of Florence)H-Index: 11
Last. Francesco BrancatiH-Index: 11
view all 4 authors...
Security is a major challenge for today's companies, especially ICT ones which manage large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insider attackers i.e., users with legitimate access which abuse or misuse of their power, thus leading to unexpected security violation (e.g., acquire and disseminate sensitive information). These attacks are very difficult to detect and mitigate due to the nature of the attacker...
Source
Sep 30, 2013 in CloudCom (IEEE International Conference on Cloud Computing Technology and Science)
#1Nicola Nostro (UniFI: University of Florence)H-Index: 6
#2Andrea Ceccarelli (UniFI: University of Florence)H-Index: 11
Last. Francesco BrancatiH-Index: 11
view all 4 authors...
Security is a major challenge for today's companies, especially ICT ones which manages large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insiders attackers i.e., users with legitimate access which abuse or misuse of their power, thus leading to unexpected security violation (e.g., acquire and disseminate sensitive information). These attacks are very difficult to detect and mitigate due to the nature of the attack...
Source
#1Chirag Modi (SVNIT: Sardar Vallabhbhai National Institute of Technology, Surat)H-Index: 12
#2Dhiren R. Patel (SVNIT: Sardar Vallabhbhai National Institute of Technology, Surat)H-Index: 18
To detect and prevent network intrusions in Cloud computing environment, we propose a novel security framework hybrid-network intrusion detection system (H-NIDS). We use different classifiers (Bayesian, Associative and Decision tree) and Snort to implement this framework. This framework aims to detect network attacks in Cloud by monitoring network traffic, while ensuring performance and service quality. We evaluate the performance and detection efficiency of H-NIDS for ensuring its feasibility i...
Source
#1Ahmad Yusri Dak (UiTM: Universiti Teknologi MARA)H-Index: 3
#2Noor Elaiza Abdul Khalid (UiTM: Universiti Teknologi MARA)H-Index: 11
Last. Saadiah Yahya (UiTM: Universiti Teknologi MARA)H-Index: 10
view all 3 authors...
Launching jamming attacks is trivial but detecting and classifying attacks are more difficult especially in Wireless Networks. This is due to the open nature of this medium that leaves it vulnerable to multiple security threats. Anyone with a transceiver can launch jamming based DoS attacks on wireless transmissions, inject spurious messages, or jam legitimate ones. Jamming attacks usually occur at physical and MAC layers and involves different methods, techniques and technology. Therefore desig...
#1Francisco J. Aparicio-Navarro (Lboro: Loughborough University)H-Index: 9
#2Konstantinos G. Kyriakopoulos (Lboro: Loughborough University)H-Index: 11
Last. David J. Parish (Lboro: Loughborough University)H-Index: 13
view all 3 authors...
Wireless networks are increasingly becoming susceptible to more sophisticated threats. An attacker may spoof the identity of legitimate users before implementing more serious attacks. Most of the current Intrusion Detection Systems (IDS) that employ multi-layer approach to help towards mitigating network attacks, offer high detection accuracy rate and low numbers of false alarms. Dempster-Shafer theory has been used with the purpose of combining beliefs of different metric measurements across mu...
This paper considers the well-known concept of uncertainty of a measurement result and discusses the mathematical approach adopted for its evaluation and expression by the present standard documents and, in particular, the Guide to the Expression of Uncertainty in Measurement. The practical limitations introduced by the assumptions of this mathematical approach are discussed, and the requirements of a new mathematical approach capable of overcoming the present limitations are drawn. A different ...
Source
Cited By15
Newest
#1V. Gowdhaman (Karpagam University)
#2R. Dhanapal (Karpagam University)
Wireless sensor network comprises of a large number of sensor nodes to acquire and transmit data to the central location. However, due to resource constrained nodes, deployment strategies and communication channel introduce numerous security challenges to the wireless sensor networks. So, it is essential to detect unauthorized access to improve the security features of wireless sensor networks. Network intrusion detection systems provide such services to the network and it becomes inevitable for...
Source
#1Demin Gao (UMN: University of Minnesota)H-Index: 2
#2Shuai Wang (SEU: Southeast University)H-Index: 13
Last. Tian He (UMN: University of Minnesota)H-Index: 2
view all 6 authors...
Abstract null null Cross-Technology Communication(CTC) enables that WiFi devices can talk to ZigBee devices directly without any hardware changes or gateway equipment, and WiFi occupies a much wider bandwidth (20MHz) than ZigBee (2MHz), which sheds the light on spoofing-jamming attack based on CTC, where a WiFi device, as a sophisticated attacker spoofs or jams an area in which multiple-channels sensor network operating. In this work, we attempt to emulate two ZigBee frames under different frequ...
Source
#1Ayyaswamy Kathirvel (SRM University)H-Index: 7
#2M. Subramaniam (SRM University)
Last. C. Sabarinath (SRM University)
view all 4 authors...
Wireless sensor network (WSN) is highly sophisticated than ad hoc wireless network. Ad hoc wireless network is mostly affected by different resources such as high processing energy, storage capabilities and battery backup and etc. Due to the open nature, poor infrastructure, quick deployment practices, and the conflict environments, make them susceptible to a wide range of attacks. Recently, the network attack affects the performance of networks such as network lifetime, throughput, delay, energ...
Source
#1Amarudin (UGM: Gadjah Mada University)H-Index: 1
#2Ridi Ferdiana (UGM: Gadjah Mada University)H-Index: 6
Last. Widyawan (UGM: Gadjah Mada University)H-Index: 13
view all 3 authors...
Study on intrusion detection system (IDS) mostly allow network administrators to focus on development activities in terms of network security and making better use of resource. Many IDS datasets, techniques and methods conducted by some administrator to get a good performance of IDS. But, some methods, techniques and datasets published differently show that research in the field of intrusion detection is losing comprehensiveness. This literature review aims to analyze and identify the research t...
Source
#1Yanmiao Li (Beijing University of Posts and Telecommunications)H-Index: 1
#2Yingying Xu (SDU: Shandong University)H-Index: 3
Last. Lizhen Cui (SDU: Shandong University)H-Index: 17
view all 8 authors...
Abstract A robust intrusion detection system plays a very important role in network security. In the face of complex network data and diverse intrusion methods, traditional machine learning methods seem to be inadequate and cannot meet the requirements of the current network environment. Existing deep learning-based methods are far from fully exploiting their potential in dealing with such one-dimensional feature data, and their performance is still unsatisfactory in detecting unknown intrusions...
Source
#1Ibrahim Ghafir (Lboro: Loughborough University)H-Index: 13
#2Konstantinos G. Kyriakopoulos (Lboro: Loughborough University)H-Index: 11
Last. Diab M. Diab (KSU: King Saud University)H-Index: 4
view all 7 authors...
Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced persistent threats (APTs) have emerged as a new and complex version of multi-stage attacks (MSAs), targeting selected companies and organizations. Current APT detection systems focus on raising the detection alerts rather than predicting APTs. Forecasting the APT stages not only reveals the APT life cycle in its early stages but also helps to under...
Source
#1Rajakumar Arul (Amrita Vishwa Vidyapeetham)H-Index: 6
#2Rajalakshmi Shenbaga Moorthy (Techno India)H-Index: 1
Last. Ali Kashif Bashir (MMU: Manchester Metropolitan University)H-Index: 26
view all 3 authors...
Source
Oct 1, 2018 in ICEE (International Conference on Electrical Engineering)
#1KurniabudiH-Index: 2
#2Benni PurnamaH-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 6 authors...
A robust increasing on smart sensors in Internet of Thing (IoT) results huge and heterogenous data and becomes a challenge in data prepocessing and analysis for anomaly detection. The lack of IoT publicly available dataset is one issue in anomaly detection research. To resolve that problem, a testbed topology is proposed in this research. In addition, a high-dimensionality data analysis faces a computational complexity. The purpose of this study is to presents a global framework for anomaly dete...
Source
#1Carmen Camara (ISCIII: Carlos III Health Institute)H-Index: 10
#2Pedro Peris-Lopez (ISCIII: Carlos III Health Institute)H-Index: 28
Last. Muawya Aldalaien (Higher Colleges of Technology)H-Index: 2
view all 4 authors...
Wireless Sensor Networks (WSNs) are a promising technology with applications in many areas such as environment monitoring, agriculture, the military field or health-care, to name but a few. Unfortunately, the wireless connectivity of the sensors opens doors to many security threats, and therefore, cryptographic solutions must be included on-board these devices and preferably in their design phase. In this vein, Random Number Generators (RNGs) play a critical role in security solutions such as au...
Source
#2Hari Om (IITs: Indian Institutes of Technology)H-Index: 4
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.