2015
DOI: 10.1109/tifs.2015.2433898
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
34
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(35 citation statements)
references
References 13 publications
1
34
0
Order By: Relevance
“…The diversity of anomalies in wireless system makes it impossible to obtain their signatures [11]. Furthermore, IDS for wireless networks have information available only from the physical and the data link layers [12] as the information present in higher layers are often encrypted and therefore not easily accessible. The problem then consists of developing a methodology for effective signal monitoring and processing, while being adaptable enough to accommodate unknown threats in the future.…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The diversity of anomalies in wireless system makes it impossible to obtain their signatures [11]. Furthermore, IDS for wireless networks have information available only from the physical and the data link layers [12] as the information present in higher layers are often encrypted and therefore not easily accessible. The problem then consists of developing a methodology for effective signal monitoring and processing, while being adaptable enough to accommodate unknown threats in the future.…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
“…They statistically analyze the signal envelope to create empirical event probabilities and use it with the two measure functions to identify interference instances. Reference [12] proposes a detection scheme to identify anomalous behavior in IEEE 802.11 Wireless LAN by analyzing MAC layer frames. The authors create a normal model using n consecutive state-machine transitions during the normal functioning of the network.…”
Section: Problem Formulation and Related Workmentioning
confidence: 99%
“…In encrypted traffic environments, secure sockets layer (SSL), wired equivalent privacy WEP, or Internet protocol security (IPsec) protocols are utilised to offer better privacy and confidentiality. Previous work in detecting web-based attacks mainly focused on investigating the log/payload content [44,45]. In view that the traffic is encrypted, payload (log) is unavailable as the content is indecipherable.…”
Section: Attack On Webmentioning
confidence: 99%
“…Hamid Alipour, et.al (2015) proposed in this paper [10], an anomaly-based intrusion detection system is described for the IEEE 802.11 wireless networks based on behavioral analysis to detect deviations from normal behaviors that are triggered by wireless network attacks. This anomaly behavior analysis of the 802.11 protocols is based on monitoring the nconsecutive transitions of the convention state machine.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%