2008
DOI: 10.1155/2009/368589
|View full text |Cite
|
Sign up to set email alerts
|

Multilayer Statistical Intrusion Detection in Wireless Networks

Abstract: The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…While the identification schemes reviewed so far have focused on the physical layer exclusively, a multi-layer framework for intrusion detection was recently proposed in [28]. Focusing on 802.11b and Bluetooth devices, the maximal overlap discrete wavelet transform was used to extract the transient; geometric unsupervised classification was then used on features extracted from the transient using a sliding window, in the time and frequency domains.…”
Section: Chapter 2 Review Of Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…While the identification schemes reviewed so far have focused on the physical layer exclusively, a multi-layer framework for intrusion detection was recently proposed in [28]. Focusing on 802.11b and Bluetooth devices, the maximal overlap discrete wavelet transform was used to extract the transient; geometric unsupervised classification was then used on features extracted from the transient using a sliding window, in the time and frequency domains.…”
Section: Chapter 2 Review Of Literaturementioning
confidence: 99%
“…We would also like to point out that several other authors also appear to assume a closed world in their work [25][26][27]36]. A valid threshold-based approach is given in [24,30,32], and while [23,28] seem to make use of thresholds, more information on their derivation is needed before a final judgement can be made as to their validity.…”
Section: Other Workmentioning
confidence: 99%