Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

A Complex Attacks Recognition Method in Wireless Intrusion Detection System

verfasst von : Guanlin Chen, Ying Wu, Kunlong Zhou, Yong Zhang

Erschienen in: Green, Pervasive, and Cloud Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

During recent years, the challenge faced by wireless network security is getting severe with the rapid development of internet. However, due to the defects of wireless communication protocol and difference among wired networks, the existing intrusion prevention systems are seldom involved. This paper proposed a method of identifying complicated multistep attacks orienting to wireless intrusion detection system, which includes the submodules of alarm simplification, VTG generator, LAG generator, attack signature database, attack path resolver and complex attack evaluation. By means of introducing logic attack diagram and virtual topological graph, the attach path was excavated. The experimental result showed that this identification method is applicable to the real scene of wireless intrusion detection, which plays certain significance to predict attackers’ ultimate attack intention.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aparicio-Navarro, F.J., Kyriakopoulos, K.G., Parish, D.J.: An automatic and self-adaptive multi-layer data fusion system for WiFi attack detection. Int. J. Internet Technol. Secur. Trans. 5(1), 42–62 (2013)CrossRef Aparicio-Navarro, F.J., Kyriakopoulos, K.G., Parish, D.J.: An automatic and self-adaptive multi-layer data fusion system for WiFi attack detection. Int. J. Internet Technol. Secur. Trans. 5(1), 42–62 (2013)CrossRef
2.
Zurück zum Zitat Afzal, Z., Rossebø, J., Talha, B., et al.: A wireless intrusion detection system for 802.11 networks. In: International Conference on IEEE Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 828–834 (2016) Afzal, Z., Rossebø, J., Talha, B., et al.: A wireless intrusion detection system for 802.11 networks. In: International Conference on IEEE Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 828–834 (2016)
3.
Zurück zum Zitat Victor, G.F., Carles, G., Helena, R.P.: A comparative study of anomaly detection techniques for smart city wireless sensor networks. Sensors 16(6), 868 (2016)CrossRef Victor, G.F., Carles, G., Helena, R.P.: A comparative study of anomaly detection techniques for smart city wireless sensor networks. Sensors 16(6), 868 (2016)CrossRef
4.
Zurück zum Zitat Liang, H., Nannan, X., Erbuli, N., et al.: A multi-stage attack scenario recognition algorithm based on intelligent planning. Chin. J. Electron. 41(9), 1753–1759 (2013) Liang, H., Nannan, X., Erbuli, N., et al.: A multi-stage attack scenario recognition algorithm based on intelligent planning. Chin. J. Electron. 41(9), 1753–1759 (2013)
5.
Zurück zum Zitat Shameli-Sendi, A., Louafi, H., He, W., et al.: A defense-centric model for multi-step attack damage cost evaluation. In: 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud), pp. 145–149. IEEE (2015) Shameli-Sendi, A., Louafi, H., He, W., et al.: A defense-centric model for multi-step attack damage cost evaluation. In: 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud), pp. 145–149. IEEE (2015)
6.
Zurück zum Zitat Bi, K., Han, D., Wang, J.: K maximum probability attack paths dynamic generation algorithm. Comput. Sci. Inf. Syst. 13(2), 677–689 (2016)CrossRef Bi, K., Han, D., Wang, J.: K maximum probability attack paths dynamic generation algorithm. Comput. Sci. Inf. Syst. 13(2), 677–689 (2016)CrossRef
7.
Zurück zum Zitat Wang, Z., Yuan, P., Huang, X., et al.: Research of a novel attack scenario constructing method. J. Southwest Univ. Sci. Technol. 31(1), 55–60 (2016) Wang, Z., Yuan, P., Huang, X., et al.: Research of a novel attack scenario constructing method. J. Southwest Univ. Sci. Technol. 31(1), 55–60 (2016)
8.
Zurück zum Zitat Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans. Smart Grid 6(6), 3104–3113 (2015)CrossRef Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans. Smart Grid 6(6), 3104–3113 (2015)CrossRef
9.
Zurück zum Zitat Julisch, K.: Mining alarm clusters to improve alarm handling efficiency. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, USA, pp. 12–21. IEEE Press (2001) Julisch, K.: Mining alarm clusters to improve alarm handling efficiency. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, USA, pp. 12–21. IEEE Press (2001)
10.
Zurück zum Zitat Jiang, Z., Zhao, J., Li, X.-Y., et al.: Rejecting the attack: source authentication for Wi-Fi management frames using CSI information. In: Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM 2013), Turin, Italy, pp. 2544–2552. IEEE Press (2013) Jiang, Z., Zhao, J., Li, X.-Y., et al.: Rejecting the attack: source authentication for Wi-Fi management frames using CSI information. In: Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM 2013), Turin, Italy, pp. 2544–2552. IEEE Press (2013)
11.
Zurück zum Zitat Thangavel, M., Thangaraj, P.: Efficient hybrid network (wired and wireless) intrusion detection using statistical data streams and detection of clustered alerts. J. Comput. Sci. 7(9), 1318–1324 (2011)CrossRef Thangavel, M., Thangaraj, P.: Efficient hybrid network (wired and wireless) intrusion detection using statistical data streams and detection of clustered alerts. J. Comput. Sci. 7(9), 1318–1324 (2011)CrossRef
Metadaten
Titel
A Complex Attacks Recognition Method in Wireless Intrusion Detection System
verfasst von
Guanlin Chen
Ying Wu
Kunlong Zhou
Yong Zhang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-15093-8_1