Intrusion detection method of wireless local area network MAC layer based on hidden Markov model

被引:0
|
作者
Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Hsi An Chiao Tung Ta Hsueh | 2009年 / 12卷 / 26-30期
关键词
Medium access control - Wireless local area networks (WLAN) - Object detection - Hidden Markov models - Network layers;
D O I
暂无
中图分类号
学科分类号
摘要
The packet field of wireless local area network (WLAN) medium access control (MAC) layer is taken for the analytical object of detecting intrusion. An intrusion detection method of WLAN MAC layer is proposed based on the hidden Markov model(HMM). A three layers frame including console, server and agents is given; the data of WLAN MAC layer is used to model the HMM; then the normal data of WLAN is used to train the HMM and to memorialize the normal action of WLAN. An intrusion will be detected when the occurring probability of a packet data or a sequence of packet data is smaller than a given threshold. Experimental results show that the proposed method has low false positive rate and missing report rate when detecting the known attacks on WLAN MAC layers, and also detects unknown attacks.
引用
收藏
相关论文
共 50 条
  • [31] An Intrusion Detection Based on Markov Model
    Li, Haisheng
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 988 - 993
  • [32] Markov localization of wireless local area network clients
    Wallbaum, M
    Wasch, T
    WIRELESS ON-DEMAND NETWORK SYSTEMS, PROCEEDINGS, 2004, 2928 : 1 - 15
  • [33] RETRACTED: Anomaly Intrusion Detection of Wireless Communication Network-Based on Markov Chain Model (Retracted Article)
    Zhang, Huifang
    Lan, Wangsen
    Zhang, Desheng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [34] HMMPayl: An intrusion detection system based on Hidden Markov Models
    Ariu, Davide
    Tronci, Roberto
    Giacinto, Giorgio
    COMPUTERS & SECURITY, 2011, 30 (04) : 221 - 241
  • [35] A layer picking method based on hidden Markov model and bresenham algorithm
    Yu, Yan-Nong
    Fang, Guang-You
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (05): : 1140 - 1143
  • [36] A Framework for MAC Layer Wireless Intrusion Detection & Response for Smart Grid Applications
    Talha, Batool
    Ray, Apala
    2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 598 - 605
  • [37] A wireless intrusion detection method based on dynamic growing neural network
    Liu, Yanheng
    Tian, Daxin
    Li, Bin
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 611 - +
  • [38] An intrusion detection method for wireless sensor network based on mathematical morphology
    Wang, Yanwen
    Wu, Xiaoling
    Chen, Hainan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2744 - 2751
  • [39] The Intrusion Detection Method based on Game Theory in Wireless Sensor Network
    Ma, Yizhong
    Cao, Hui
    Ma, Jun
    2008 FIRST IEEE INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS, PROCEEDINGS, 2008, : 326 - 331
  • [40] Analysis of Intrusion Detection Tools for Wireless Local Area Networks
    Singh, Jatinder
    Kaur, Lakhwinder
    Gupta, Savita
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 168 - 177