IEEE 802.11 anomaly-based behavior analysis

Hamid Alipour, Youssif B. Al-Nashif, Salim Hariri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Fast, easy and inexpensive deployment of wireless networks has made them one of the most popular communication environments. Wireless networks are becoming ubiquitous and widely used to transfer critical information such as banking accounts, credit cards, e-mails and social network credentials. The more pervasive the wireless technology is going to be, the more important its security issue will be. The current security protocols for wireless networks have addressed the privacy and confidentiality issues, but failed to address other important security attributes such as availability and integrity (e.g. denial of service, session hijacking and MAC address spoofing attacks). In this paper we describe an anomaly-based intrusion detection system for the IEEE 802.11 wireless networks, based on tempo-spatial data analysis technique to detect deviations from normal behaviors that are triggered by wireless network attacks. Our anomaly behavior analysis of the 802.11 protocol is based on n-gram pattern analysis. We apply statistical techniques to quantify the n-transition patterns in the protocol and determine the probabilities of these transitions being normal.

Original languageEnglish (US)
Title of host publication2013 International Conference on Computing, Networking and Communications, ICNC 2013
Pages369-373
Number of pages5
DOIs
StatePublished - 2013
Event2013 International Conference on Computing, Networking and Communications, ICNC 2013 - San Diego, CA, United States
Duration: Jan 28 2013Jan 31 2013

Publication series

Name2013 International Conference on Computing, Networking and Communications, ICNC 2013

Other

Other2013 International Conference on Computing, Networking and Communications, ICNC 2013
Country/TerritoryUnited States
CitySan Diego, CA
Period1/28/131/31/13

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'IEEE 802.11 anomaly-based behavior analysis'. Together they form a unique fingerprint.

Cite this