About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International IEEE Conference on Pervasive Services

Research Article

Anomaly-based Protection Approach against Wireless Network Attacks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/PERSER.2007.4283916,
        author={Samer  Fayssal and Salim Hariri},
        title={Anomaly-based Protection Approach against Wireless Network Attacks},
        proceedings={1st International IEEE Conference on Pervasive Services},
        publisher={IEEE},
        proceedings_a={ICPS},
        year={2007},
        month={8},
        keywords={Computer networks  Computerized monitoring  Condition monitoring  Costs  Data mining  Intrusion detection  Protection  Signal analysis  Time measurement  Wireless networks},
        doi={10.1109/PERSER.2007.4283916}
    }
    
  • Samer Fayssal
    Salim Hariri
    Year: 2007
    Anomaly-based Protection Approach against Wireless Network Attacks
    ICPS
    IEEE
    DOI: 10.1109/PERSER.2007.4283916
Samer Fayssal1,*, Salim Hariri1,*
  • 1: Electrical and Computer Engineering Department The University of Arizona Tucson, AZ 85721
*Contact email: sfayssal@ece.arizona.edu, hariri@ece.arizona.edu

Abstract

The increasing deployment of Wireless Networks has experienced also an exponential increase in wireless faults vulnerabilities and attacks. In this paper, we present a wireless self-protection system (WSPS) that has the following significant features: online monitor of the behavior of wireless network, generate relevant network features, track wireless network state machine violations, generate wireless flow keys (WFK), and use the dynamically updated anomaly and misuse rules to detect complex known and unknown wireless attacks. WSPS quantifies the attack impact using the abnormality distance from the baseline normal models. We validate the WSPS approach by experimenting with different wireless attacks, and show that WSPS can detect accurately wireless network attacks and proactively protect against these attacks.

Keywords
Computer networks Computerized monitoring Condition monitoring Costs Data mining Intrusion detection Protection Signal analysis Time measurement Wireless networks
Published
2007-08-08
Publisher
IEEE
Modified
2011-08-07
http://dx.doi.org/10.1109/PERSER.2007.4283916
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL