scispace - formally typeset
Journal ArticleDOI

Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection

Reads0
Chats0
TLDR
This work compares the performance of local algorithms on the basis of the signal-to-interference-plus-noise ratio SINR executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algorithms with the Dempster-Shafer theory of evidence algorithm.
Abstract
We present intrusion detection algorithms to detect physical layer jamming attacks in wireless networks. We compare the performance of local algorithms on the basis of the signal-to-interference-plus-noise ratio SINR executing independently at several monitors, with a collaborative detection algorithm that fuses the outputs provided by these algorithms. The local algorithms fall into two categories: simple threshold that raise an alarm if the output of the SINR-based metrics we consider deviates from a predefined detection threshold and cumulative sum cusum algorithms that raise an alarm if the aggregated output exceeds the predefined threshold. For collaborative detection, we use the Dempster-Shafer theory of evidence algorithm. We collect SINR traces from a real IEEE 802.11 network, and with the use of a new evaluation method, we evaluate both the local and the Dempster-Shafer algorithms in terms of the detection probability, false alarm rate, and their robustness to different detection threshold values, under different attack intensities. The evaluation shows that the cusums achieve higher performance than the simple threshold algorithms under all attack intensities. The Dempster-Shafer algorithm when combined with the simple algorithms, it can increase their performance by more than 80%, but for the cusum algorithms it does not substantially improve their already high performance.Copyright © 2013 John Wiley & Sons, Ltd.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection

TL;DR: A novel deep-feature extraction and selection (D-FES) which combines stacked feature extraction and weighted feature selection inspired by an existing shallow-structured machine learner is proposed, which achieves a detection accuracy of 99.918% and a false alarm rate of 0.012%, which is the most accurate detection of impersonation attacks reported in the literature.
Journal ArticleDOI

A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud

TL;DR: A proactive bait based Honeypot optimized IDS system is also proposed with the aim to detect existing and zero-day attacks with minimal overhead and to bridge the research gaps in terms of performance, detection rate and overhead.
Reference BookDOI

The State of the Art in Intrusion Prevention and Detection

TL;DR: The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks, to present novel schemes for intrusion detection and prevention.
Journal ArticleDOI

A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET

TL;DR: The proposed approach increases the performance of a Distributed Denial of Service (DDoS) attack detection in a VANET environment by calculating various factors like Conflict field, Conflict data and Attack signature sample rate (CCA).
Journal ArticleDOI

A Hybrid Intrusion Detection System for Virtual Jamming Attacks on Wireless Networks

TL;DR: A novel Hybrid-NIDS (H- NIDS) based on Dempster-Shafer (DS) Theory of Evidence is presented, which aims at combining the advantages of signature-based and anomaly-based NIDSs for virtual jamming attacks on IEEE 802.11 networks.
References
More filters
Book

A mathematical theory of evidence

Glenn Shafer
TL;DR: This book develops an alternative to the additive set functions and the rule of conditioning of the Bayesian theory: set functions that need only be what Choquet called "monotone of order of infinity." and Dempster's rule for combining such set functions.
Journal ArticleDOI

On the Dempster-Shafer framework and new combination rules

TL;DR: The basic concepts of the Dempster-Shafer approach, basic probability assignments, belief functions, and probability functions are discussed, and how to represent various types of knowledge in this framework is discussed.
Proceedings ArticleDOI

The feasibility of launching and detecting jamming attacks in wireless networks

TL;DR: This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.
Journal ArticleDOI

Jamming sensor networks: attack and defense strategies

TL;DR: In this paper, the authors survey different jamming attacks that may be employed against a sensor network and highlight the challenges associated with detecting jamming, and propose two different but complementary approaches.
Journal ArticleDOI

Denial of Service Attacks in Wireless Networks: The Case of Jammers

TL;DR: This survey presents a detailed up-to-date discussion on the jamming attacks recorded in the literature and describes various techniques proposed for detecting the presence of jammers.
Related Papers (5)