A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks

Published on May 9, 2019in IEEE Access3.745
· DOI :10.1109/ACCESS.2019.2915936
Jaime Zuniga-Mejia2
Estimated H-index: 2
(Tec: Monterrey Institute of Technology and Higher Education),
Rafaela Villalpando-Hernandez4
Estimated H-index: 4
(Tec: Monterrey Institute of Technology and Higher Education)
+ 1 AuthorsAndreas Spanias32
Estimated H-index: 32
(ASU: Arizona State University)
Sources
Abstract
Reconfigurable wireless networks, such as ad hoc or wireless sensor networks, do not rely on fixed infrastructure. Nodes must cooperate in the multi-hop routing process. This dynamic and open nature make reconfigurable networks vulnerable to routing attacks that could degrade significantly network performance. Intrusion detection systems consist of a set of techniques designed to identify hostile behavior. In this paper, there are several approaches for intrusion detection in reconfigurable network routing such as collaborative, statistical, or machine learning-based techniques. In this paper, we introduce a new approach to intrusion detection for reconfigurable network routing based on linear systems theory. Using this approach, we can discriminate routing attacks by considering the system’s z-plane poles. The z-plane can be thought of as a two dimensional feature space that arises naturally. It is independent of the number of network attack detection metrics and does not require extra dimensionality reduction. Two different host-based intrusion detection techniques, inspired by this new linear systems perspective, are presented and analyzed through a case study. The case study considers the effects of attack severity and node mobility to the attack detection performance. High attack detection accuracy was obtained without increasing packet overhead for both techniques by analyzing locally available information.
📖 Papers frequently viewed together
2014ICPADS: International Conference on Parallel and Distributed Systems
4 Citations
11 Citations
2008
4 Authors (Ghufran Ahmed, ..., Pierre Vigneras)
1 Citations
References0
Newest
Cited By4
Newest
#2Varalakshmi Perumal (Madras Institute of Technology)H-Index: 2
view all 2 authors...
Source
#1Jin Yang (Sichuan University)H-Index: 3
#2Tao Li (Sichuan University)H-Index: 11
Last. Fangdong Zhu (Sichuan University)H-Index: 2
view all 6 authors...
Abstract A Spam Transaction attack is a kind of hostile attack activity specifically targeted against a Cryptocurrency Network. Traditional network intrusion detection methods lack the capability of automatic feature extraction for spam transaction attacks, and thus the detection efficiency is low. Worse still, these kinds of attack methods and the key intrusion behaviour process are usually concealed and submerged into a large number of normal data packages; therefore, the captured threat test ...
1 CitationsSource
#1Hugo F. M. de Figueiredo (UTFPR: Federal University of Technology - Paraná)H-Index: 1
#2Matheus K. Ferst (UTFPR: Federal University of Technology - Paraná)H-Index: 1
Last. Gustavo Weber Denardin (UTFPR: Federal University of Technology - Paraná)H-Index: 9
view all 3 authors...
The power SCADA systems have been undergoing several upgrades over the years. At first, these systems were based only on isolated processes, without the need to connect in a global network, such as the Internet. In recent years, the access to such an open network has been critical for the SCADA systems, due to the need for data exchange across large areas, between geographically remote industrial plants, or even because of the demand for remote applications. Despite the SCADA systems have advant...
Source
#1Jaime Zuniga-Mejia (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 2
#2Rafaela Villalpando-Hernandez (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 4
Last. Cesar Vargas-Rosales (Tec: Monterrey Institute of Technology and Higher Education)H-Index: 13
view all 3 authors...
Data routing is one of the most essential functions having a direct impact on network performance. Due to the lack of any fixed infrastructure, data routing must be achieved through collaboration of nodes in Reconfigurable Wireless Networks (RWN). This implies that a malicious node can participate in the routing process and launch an attack to gain control over data traffic. Intrusion Detection Systems (IDS) are typically used to recognize malicious activities. Any IDS for routing attack-detecti...
Source