Real-time detection of traffic anomalies in wireless mesh networks

被引:6
|
作者
Zaidi, Zainab R. [1 ,5 ]
Hakami, Sara [2 ,4 ]
Landfeldt, Bjorn [3 ,4 ]
Moors, Tim [2 ]
机构
[1] Networked Syst Grp, NICTA, Alexandria, NSW 1435, Australia
[2] UNSW, Sch EE&T, Sydney, NSW 2052, Australia
[3] USyd, Sch IT, Sydney, NSW 2006, Australia
[4] NICTA, Alexandria, NSW, Australia
[5] George Mason Univ, Network Architecture Lab, Fairfax, VA 22030 USA
关键词
Anomaly detection; Wireless mesh networks; Principal component analysis; Chi-square statistics; Denial-of-service; Port scan;
D O I
10.1007/s11276-009-0221-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anomaly detection is emerging as a necessary component as wireless networks gain popularity. Anomaly detection has been addressed broadly in wired networks and powerful methods have been developed for correct detection of a variety of known attacks and other anomalies. In this paper, we propose a real-time anomaly detection and identification scheme for wireless mesh networks (WMN) using components from previous methods developed for wired networks. Experiments over a WMN testbed show the effectiveness of the proposed scheme in isolating different types of anomalies, such as Denial-of-service attacks, port scan attacks, etc. Our scheme uses Chi-square statistics and it is based on similar ideas as the scheme presented by Lakhina et al. although it has lower computational complexity. The original method by Lakhina et al. was developed for wired networks and used Principal Component Analysis (PCA) for reducing the dimensions of observed data and Hotelling's t (2) statistics to distinguish between normal and abnormal traffic conditions. However, in our studies we found that dimension reduction is the most computationally intensive process of the scheme. In this paper we propose an alternative way of reducing dimensions using flow variances in a Chi-square test. Experimental results show that the Chi-square test performs similarly well to the PCA-based method at merely a fraction of the computations. Moreover, we propose an automatic identification scheme to pin-point the cause of the detected anomaly and its contribution in terms of additional or lack of traffic. Our results and comparison with other statistical tools show that the Chi-square test and the PCA-based method with identification scheme make powerful tools for real-time detection of various anomalies in an interference prone wireless networking environment.
引用
收藏
页码:1675 / 1689
页数:15
相关论文
共 50 条
  • [31] Scheduling Real-Time Traffic in Underwater Acoustic Wireless Sensor Networks
    Santos, Rodrigo
    Orozco, Javier
    Micheletto, Martias
    Ochoa, Sergio F.
    Meseguer, Roc
    Millan, Pere
    Molina, Carlos
    [J]. UBIQUITOUS COMPUTING AND AMBIENT INTELLIGENCE, UCAMI 2016, PT II, 2016, 10070 : 150 - 162
  • [32] Stochastic traffic engineering for real-time applications over wireless networks
    Cordeschi, Nicola
    Patriarca, Tatiana
    Baccarelli, Enzo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) : 681 - 694
  • [33] Optimal Scheduling of Real-Time Traffic in Wireless Networks with Delayed Feedback
    Kim, Kyu Seob
    Li, Chih-Ping
    Kadota, Igor
    Modiano, Eytan
    [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 1143 - 1149
  • [34] Performance of real-time and data traffic in heterogeneous overlay wireless networks
    Zhang, WH
    [J]. PERFORMANCE CHALLENGES FOR EFFICIENT NEXT GENERATION NETWORKS, VOLS 6A-6C, 2005, 6A-6C : 859 - 868
  • [35] Intelligent rate control for supporting real-time traffic in WLAN mesh networks
    Zhu, Rongbo
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1449 - 1458
  • [36] A Method for Anomalies Detection in Real-Time Ethernet Data Traffic Applied to PROFINET
    Sestito, Guilherme Serpa
    Turcato, Afonso Celso
    Dias, Andre Luis
    Rocha, Murilo Silveira
    da Silva, Maira Martins
    Ferrari, Paolo
    Brandao, Dennis
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (05) : 2171 - 2180
  • [37] A Bluetooth Low Energy real-time protocol for industrial wireless mesh networks
    Patti, Gaetano
    Leonardi, Luca
    Lo Bello, Lucia
    [J]. PROCEEDINGS OF THE IECON 2016 - 42ND ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2016, : 4621 - 4626
  • [38] An Opportunistic Approach to Deal with Real-Time Mesh Communication in Wireless Sensor Networks
    Leao, Erico
    Vasques, Francisco
    Portugal, Paulo
    Montez, Carlos
    [J]. 2014 12TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2014, : 100 - +
  • [39] A Bandwidth Management Scheme Support for Real-time Applications in Wireless Mesh Networks
    Yan Wei
    Ren Maosheng
    Tong Zhao
    Li Xiaoming
    [J]. APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2063 - 2068
  • [40] Real-time Detection of Clone Attacks in Wireless Sensor Networks
    Xing, Kai
    Liu, Fang
    Cheng, Xiuzhen
    Du, David H. C.
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 3 - +