Fusing multi-layer metrics for detecting security attacks in 802.11 networks
Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Kyriakopoulos, K. G. Aparicio-Navarro, F. J. Parish, D. J. |
description | Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status of a network, is rarely accurately detectable by examining only one network layer or metric. Ideally, a synergistic approach would require knowledge from various layers to be fused and, collectively, an ultimate decision to be taken. To this aim, the Dempster-Shafer (D-S) approach is examined as a data fusion algorithm that combines beliefs of multiple metrics across multiple layers. This paper describes the methodology of using metrics from multiple layers of wireless communication networks for detecting wireless security breaches. The metrics are analysed and compared to historical data and each gives a belief of whether an attack takes place or not. The beliefs from different metrics are fused with the D-S technique with the ultimate goal of limiting false alarms by combining beliefs from various network layers. The results show that cross-layer techniques and data fusion perform more efficiently in a variety of situations compared to conventional methods. |
doi_str_mv | 10.1109/WTS.2011.5960832 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5960832</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5960832</ieee_id><sourcerecordid>5960832</sourcerecordid><originalsourceid>FETCH-LOGICAL-i217t-23eae465f264157251bafd6a4c7f3e234fe6f8c87659cb28cd1c4c508cdde233</originalsourceid><addsrcrecordid>eNpVkEtLQzEUhOMLrLV7wU3-wL2ek_ddSrEqFFxYcFnS3BOJfUmSIv33ttiNqxn4hmEYxu4QWkToHj5m760AxFZ3BpwUZ2zUWYdKWwtoEM7ZQJgOGielufjHhL1kA-ykajRYuGY3pXwBaI0OBmw62ZW0-eTr3aqmZuX3lPmaak6h8LjNvKdKoR4ThcIup7rnvlYfloWnDXcgDuv4hurPNi_LLbuKflVodNIhm02eZuOXZvr2_Dp-nDZJoK2NkORJGR2FUait0LjwsTdeBRslCakimeiCs0Z3YSFc6DGooOFg-gOWQ3b_V5uIaP6d09rn_fz0i_wFqwxR7A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Fusing multi-layer metrics for detecting security attacks in 802.11 networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kyriakopoulos, K. G. ; Aparicio-Navarro, F. J. ; Parish, D. J.</creator><creatorcontrib>Kyriakopoulos, K. G. ; Aparicio-Navarro, F. J. ; Parish, D. J.</creatorcontrib><description>Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status of a network, is rarely accurately detectable by examining only one network layer or metric. Ideally, a synergistic approach would require knowledge from various layers to be fused and, collectively, an ultimate decision to be taken. To this aim, the Dempster-Shafer (D-S) approach is examined as a data fusion algorithm that combines beliefs of multiple metrics across multiple layers. This paper describes the methodology of using metrics from multiple layers of wireless communication networks for detecting wireless security breaches. The metrics are analysed and compared to historical data and each gives a belief of whether an attack takes place or not. The beliefs from different metrics are fused with the D-S technique with the ultimate goal of limiting false alarms by combining beliefs from various network layers. The results show that cross-layer techniques and data fusion perform more efficiently in a variety of situations compared to conventional methods.</description><identifier>ISSN: 1934-5070</identifier><identifier>ISBN: 9781457701627</identifier><identifier>ISBN: 1457701626</identifier><identifier>EISSN: 2690-8336</identifier><identifier>EISBN: 9781457701610</identifier><identifier>EISBN: 1457701618</identifier><identifier>EISBN: 145770160X</identifier><identifier>EISBN: 9781457701603</identifier><identifier>DOI: 10.1109/WTS.2011.5960832</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Cross-layer measurements ; data fusion ; Dempster-Shafer ; IEEE 802.11 Standards ; Measurement ; Monitoring ; Physical layer ; Wi-Fi ; wireless attacks ; Wireless networks</subject><ispartof>2011 Wireless Telecommunications Symposium (WTS), 2011, p.1-6</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5960832$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5960832$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kyriakopoulos, K. G.</creatorcontrib><creatorcontrib>Aparicio-Navarro, F. J.</creatorcontrib><creatorcontrib>Parish, D. J.</creatorcontrib><title>Fusing multi-layer metrics for detecting security attacks in 802.11 networks</title><title>2011 Wireless Telecommunications Symposium (WTS)</title><addtitle>WTS</addtitle><description>Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status of a network, is rarely accurately detectable by examining only one network layer or metric. Ideally, a synergistic approach would require knowledge from various layers to be fused and, collectively, an ultimate decision to be taken. To this aim, the Dempster-Shafer (D-S) approach is examined as a data fusion algorithm that combines beliefs of multiple metrics across multiple layers. This paper describes the methodology of using metrics from multiple layers of wireless communication networks for detecting wireless security breaches. The metrics are analysed and compared to historical data and each gives a belief of whether an attack takes place or not. The beliefs from different metrics are fused with the D-S technique with the ultimate goal of limiting false alarms by combining beliefs from various network layers. The results show that cross-layer techniques and data fusion perform more efficiently in a variety of situations compared to conventional methods.</description><subject>Communication system security</subject><subject>Cross-layer measurements</subject><subject>data fusion</subject><subject>Dempster-Shafer</subject><subject>IEEE 802.11 Standards</subject><subject>Measurement</subject><subject>Monitoring</subject><subject>Physical layer</subject><subject>Wi-Fi</subject><subject>wireless attacks</subject><subject>Wireless networks</subject><issn>1934-5070</issn><issn>2690-8336</issn><isbn>9781457701627</isbn><isbn>1457701626</isbn><isbn>9781457701610</isbn><isbn>1457701618</isbn><isbn>145770160X</isbn><isbn>9781457701603</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVkEtLQzEUhOMLrLV7wU3-wL2ek_ddSrEqFFxYcFnS3BOJfUmSIv33ttiNqxn4hmEYxu4QWkToHj5m760AxFZ3BpwUZ2zUWYdKWwtoEM7ZQJgOGielufjHhL1kA-ykajRYuGY3pXwBaI0OBmw62ZW0-eTr3aqmZuX3lPmaak6h8LjNvKdKoR4ThcIup7rnvlYfloWnDXcgDuv4hurPNi_LLbuKflVodNIhm02eZuOXZvr2_Dp-nDZJoK2NkORJGR2FUait0LjwsTdeBRslCakimeiCs0Z3YSFc6DGooOFg-gOWQ3b_V5uIaP6d09rn_fz0i_wFqwxR7A</recordid><startdate>20110101</startdate><enddate>20110101</enddate><creator>Kyriakopoulos, K. G.</creator><creator>Aparicio-Navarro, F. J.</creator><creator>Parish, D. J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20110101</creationdate><title>Fusing multi-layer metrics for detecting security attacks in 802.11 networks</title><author>Kyriakopoulos, K. G. ; Aparicio-Navarro, F. J. ; Parish, D. J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i217t-23eae465f264157251bafd6a4c7f3e234fe6f8c87659cb28cd1c4c508cdde233</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Communication system security</topic><topic>Cross-layer measurements</topic><topic>data fusion</topic><topic>Dempster-Shafer</topic><topic>IEEE 802.11 Standards</topic><topic>Measurement</topic><topic>Monitoring</topic><topic>Physical layer</topic><topic>Wi-Fi</topic><topic>wireless attacks</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Kyriakopoulos, K. G.</creatorcontrib><creatorcontrib>Aparicio-Navarro, F. J.</creatorcontrib><creatorcontrib>Parish, D. J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kyriakopoulos, K. G.</au><au>Aparicio-Navarro, F. J.</au><au>Parish, D. J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Fusing multi-layer metrics for detecting security attacks in 802.11 networks</atitle><btitle>2011 Wireless Telecommunications Symposium (WTS)</btitle><stitle>WTS</stitle><date>2011-01-01</date><risdate>2011</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1934-5070</issn><eissn>2690-8336</eissn><isbn>9781457701627</isbn><isbn>1457701626</isbn><eisbn>9781457701610</eisbn><eisbn>1457701618</eisbn><eisbn>145770160X</eisbn><eisbn>9781457701603</eisbn><abstract>Computer networks and more specifically wireless communication networks are increasingly becoming susceptible to more sophisticated and untraceable attacks. Most of the current Intrusion Detection Systems either focus on just one layer of observation or use a limited number of metrics without proper data fusion techniques. However, the true status of a network, is rarely accurately detectable by examining only one network layer or metric. Ideally, a synergistic approach would require knowledge from various layers to be fused and, collectively, an ultimate decision to be taken. To this aim, the Dempster-Shafer (D-S) approach is examined as a data fusion algorithm that combines beliefs of multiple metrics across multiple layers. This paper describes the methodology of using metrics from multiple layers of wireless communication networks for detecting wireless security breaches. The metrics are analysed and compared to historical data and each gives a belief of whether an attack takes place or not. The beliefs from different metrics are fused with the D-S technique with the ultimate goal of limiting false alarms by combining beliefs from various network layers. The results show that cross-layer techniques and data fusion perform more efficiently in a variety of situations compared to conventional methods.</abstract><pub>IEEE</pub><doi>10.1109/WTS.2011.5960832</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1934-5070 |
ispartof | 2011 Wireless Telecommunications Symposium (WTS), 2011, p.1-6 |
issn | 1934-5070 2690-8336 |
language | eng |
recordid | cdi_ieee_primary_5960832 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Communication system security Cross-layer measurements data fusion Dempster-Shafer IEEE 802.11 Standards Measurement Monitoring Physical layer Wi-Fi wireless attacks Wireless networks |
title | Fusing multi-layer metrics for detecting security attacks in 802.11 networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T22%3A10%3A42IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Fusing%20multi-layer%20metrics%20for%20detecting%20security%20attacks%20in%20802.11%20networks&rft.btitle=2011%20Wireless%20Telecommunications%20Symposium%20(WTS)&rft.au=Kyriakopoulos,%20K.%20G.&rft.date=2011-01-01&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1934-5070&rft.eissn=2690-8336&rft.isbn=9781457701627&rft.isbn_list=1457701626&rft_id=info:doi/10.1109/WTS.2011.5960832&rft_dat=%3Cieee_6IE%3E5960832%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457701610&rft.eisbn_list=1457701618&rft.eisbn_list=145770160X&rft.eisbn_list=9781457701603&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5960832&rfr_iscdi=true |