+44 (0)1509 263171
Please use this identifier to cite or link to this item:
|Title: ||Fusing multi-layer metrics for detecting security attacks in 802.11 networks|
|Authors: ||Kyriakopoulos, Konstantinos G.|
Aparicio-Navarro, Francisco J.
Parish, David J.
|Keywords: ||Cross-layer measurements|
|Issue Date: ||2011|
|Publisher: ||© IEEE|
|Citation: ||KYRIAKOPOULOS, K.G., APARICIO-NAVARRO, F.J. and PARISH, D.J., 2011. Fusing multi-layer metrics for detecting security attacks in 802.11 networks. IN: Proceeedings of WTS 2011. Wireless Telecommunications Symposium, New York, USA, 13th-15th April.|
|Abstract: ||Computer networks and more specifically wireless
communication networks are increasingly becoming susceptible
to more sophisticated and untraceable attacks. Most of the
current Intrusion Detection Systems either focus on just one layer
of observation or use a limited number of metrics without proper
data fusion techniques. However, the true status of a network,
is rarely accurately detectable by examining only one network
layer or metric. Ideally, a synergistic approach would require
knowledge from various layers to be fused and, collectively, an
ultimate decision to be taken. To this aim, the Dempster-Shafer
(D-S) approach is examined as a data fusion algorithm that
combines beliefs of multiple metrics across multiple layers.
This paper describes the methodology of using metrics from
multiple layers of wireless communication networks for detecting
wireless security breaches. The metrics are analysed and compared
to historical data and each gives a belief of whether an
attack takes place or not. The beliefs from different metrics are
fused with the D-S technique with the ultimate goal of limiting
false alarms by combining beliefs from various network layers.
The results show that cross-layer techniques and data fusion
perform more efficiently in a variety of situations compared to
|Description: ||This is a conference paper. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Version: ||Accepted for publication|
|Publisher Link: ||http://www.csupomona.edu/~wtsi/wts/index.htm|
|Appears in Collections:||Conference Papers (Electronic, Electrical and Systems Engineering)|
Files associated with this item:
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.