메뉴 건너뛰기




Volumn 18, Issue 1, 2016, Pages 184-208

Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset

Author keywords

802.11; Attacks; Dataset; Intrusion detection; Security; WiFi

Indexed keywords

ARTIFICIAL INTELLIGENCE; LEARNING ALGORITHMS; LEARNING SYSTEMS; MERCURY (METAL); MOBILE SECURITY; NETWORK SECURITY; NEXT GENERATION NETWORKS; WI-FI; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84962359508     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2015.2402161     Document Type: Article
Times cited : (438)

References (69)
  • 1
    • 84962387684 scopus 로고    scopus 로고
    • Cisco, San Jose, CA, USA
    • K. Bode, Wireless traffic to reach 11. 2 exabytes a month, Cisco, San Jose, CA, USA, 2013. [Online]. Available: http://www.dslreports.com/shownews/Cisco-Wireless-Traffic-to-Reach-112-Exabytes-a-Month-By-2017-123040
    • (2013) Wireless Traffic to Reach 11. 2 Exabytes A Month
    • Bode, K.1
  • 2
    • 84962387686 scopus 로고    scopus 로고
    • IEEE Standard for Information Technology, Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Std. 802.11-1997
    • IEEE Standard for Information Technology, Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 802. 11-1997, 1997. [Online]. Available: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=654749
    • (1997)
  • 3
    • 84938764738 scopus 로고    scopus 로고
    • Design and implementation of high-speed brute forcer for wpa/wpa2-psk [j]
    • L. Yong-lei, J. Zhi-gang, C. Zhe, and L. Jing-wei, "Design and implementation of high-speed brute forcer for wpa/wpa2-psk [j]," Comput. Eng., vol. 37, no. 10, pp. 125-127, 2011.
    • (2011) Comput. Eng. , vol.37 , Issue.10 , pp. 125-127
    • Yong-Lei, L.1    Zhi-Gang, J.2    Zhe, C.3    Jing-Wei, L.4
  • 4
    • 84962382537 scopus 로고    scopus 로고
    • T. Labs, Cloudcracker, Nov.
    • T. Labs, Cloudcracker, Nov. 2014. [Online]. Available: http://www.cloudcracker.net
    • (2014)
  • 5
    • 0004010950 scopus 로고    scopus 로고
    • IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Protected Management Frames 802. 11w-2009
    • IEEE Standard for Information TechnologyTelecommunications and Information Exchange Between SystemsLocal and Metropolitan Area NetworksSpecific Requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Protected Management Frames, IEEE Std. 802. 11w-2009, 2009. [Online]. Available: http://standards.ieee.org/findstds/standard/802.11w-2009.html
    • (2009) IEEE Std.
  • 7
    • 84962355889 scopus 로고    scopus 로고
    • Aircrack-ng Nov.
    • Aircrack-ng, Nov. 2014. [Online]. Available: http://www.aircrack-ng.org
    • (2014)
  • 8
    • 85143166035 scopus 로고    scopus 로고
    • Security analysis and improvements for IEEE 802. 11i
    • Stanford, CA, USA
    • C. He and J. C. Mitchell, "Security analysis and improvements for IEEE 802. 11i," in Proc. 12th Annu. NDSS Symp., Stanford, CA, USA, 2005, pp. 90-110.
    • (2005) Proc. 12th Annu. NDSS Symp. , pp. 90-110
    • He, C.1    Mitchell, J.C.2
  • 9
    • 77954404663 scopus 로고    scopus 로고
    • Analysis and improvements over DoS attacks against IEEE 802. 11i standard
    • L. Wang and B. Srinivasan, "Analysis and improvements over DoS attacks against IEEE 802. 11i standard," in Proc. 2nd Int. Conf. NSWCTC, 2010, vol. 2, pp. 109-113.
    • (2010) Proc. 2nd Int. Conf. NSWCTC , vol.2 , pp. 109-113
    • Wang, L.1    Srinivasan, B.2
  • 10
    • 84889737981 scopus 로고    scopus 로고
    • Cisco. (2014, Nov.) San Jose, CA, USA
    • Cisco. (2014, Nov. ). Cisco adaptive wireless IPS software, San Jose, CA, USA. [Online]. Available: http://www.cisco.com/c/en/us/products/collateral/wireless/adaptive-wireless-ips-software/data-sheet-c78-501388.pdf
    • Cisco Adaptive Wireless IPS Software
  • 14
    • 33751057942 scopus 로고    scopus 로고
    • Measurements of in-motion 802. 11 networking
    • R. Gass, J. Scott, and C. Diot, "Measurements of in-motion 802. 11 networking," in Proc. 7th IEEE WMCSA, 2005, pp. 69-74.
    • (2005) Proc. 7th IEEE WMCSA , pp. 69-74
    • Gass, R.1    Scott, J.2    Diot, C.3
  • 15
    • 84962407769 scopus 로고    scopus 로고
    • Nov.
    • The kdd99 Dataset, Nov. 2014. [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/task.html
    • (2014) The kdd99 Dataset
  • 16
    • 0006000876 scopus 로고    scopus 로고
    • IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems 802. 16e-2005
    • IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std. 802. 16e-2005, i. s., 2005. [Online]. Available: http://standards.ieee.org/getieee802/download/802.16e-2005.pdf
    • (2005) IEEE Std.
  • 17
    • 77952404095 scopus 로고    scopus 로고
    • Eur. Telecommun. Standards Inst. Universal Mobile Telecommunications System (UMTS) 3rd Generation Partnership Project, Cedex, France
    • Eur. Telecommun. Standards Inst. (2011). Universal Mobile Telecommunications System (UMTS); User Equipment (UE) Radio Transmission and Reception (FDD), 3rd Generation Partnership Project, Cedex, France. [Online]. Available: http://www.3gpp.org/specifications/79-specification-numbering
    • (2011) User Equipment (UE) Radio Transmission and Reception (FDD)
  • 20
    • 84893799219 scopus 로고    scopus 로고
    • Real-time detection of denial-of-service attacks in IEEE 802. 11p vehicular networks
    • Jan.
    • N. Lyamin, A. Vinel, M. Jonsson, and J. Loo, "Real-time detection of denial-of-service attacks in IEEE 802. 11p vehicular networks," IEEE Commun. Lett., vol. 18, no. 1, pp. 110-113, Jan. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.1 , pp. 110-113
    • Lyamin, N.1    Vinel, A.2    Jonsson, M.3    Loo, J.4
  • 21
    • 84928035601 scopus 로고    scopus 로고
    • Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
    • Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 4: Enhancements for Very High Throughput for Operation in Bands Below 6 GHz, 2013. [Online]. Available: http://standards.ieee.org/getieee802/download/802.11ac-2013.pdf
    • (2013) Amendment 4: Enhancements for Very High Throughput for Operation in Bands below 6 GHz
  • 22
    • 84962382531 scopus 로고    scopus 로고
    • Denial of service attacks in wireless networks: The case of jammers
    • Jan.
    • L. Devi and A. Suganthi, "Denial of service attacks in wireless networks: The case of jammers," Int. J. Comput. Sci. Mobile Comput., vol. 3, no. 1, pp. 548-558, Jan. 2014.
    • (2014) Int. J. Comput. Sci. Mobile Comput. , vol.3 , Issue.1 , pp. 548-558
    • Devi, L.1    Suganthi, A.2
  • 25
    • 23344447681 scopus 로고    scopus 로고
    • WiFi attack vectors
    • Aug.
    • H. Berghel and J. Uecker, "WiFi attack vectors," Commun. ACM, vol. 48, no. 8, pp. 21-28, Aug. 2005.
    • (2005) Commun. ACM , vol.48 , Issue.8 , pp. 21-28
    • Berghel, H.1    Uecker, J.2
  • 26
    • 77950637056 scopus 로고    scopus 로고
    • Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland, Tech. Rep.
    • R. Chaabouni, "BreakWEPfasterwithstatistical analysis,"Ecole Polytechnique Federale de Lausanne, Lausanne, Switzerland, Tech. Rep., 2006.
    • (2006) Break WEP Fasterwithstatistical Analysis
    • Chaabouni, R.1
  • 28
    • 47749085463 scopus 로고    scopus 로고
    • Attacks on the RC4 stream cipher
    • Sep.
    • A. Klein, "Attacks on the RC4 stream cipher," Des., Codes Cryptography, vol. 48, no. 3, pp. 269-286, Sep. 2008.
    • (2008) Des., Codes Cryptography , vol.48 , Issue.3 , pp. 269-286
    • Klein, A.1
  • 30
    • 78549267482 scopus 로고    scopus 로고
    • Survey on security scheme and attacking methods of wpa/wpa2
    • Y. Liu, Z. Jin, and Y. Wang, "Survey on security scheme and attacking methods of wpa/wpa2," in Proc. 6th Int. Conf. WiCOM, 2010, pp. 1-4.
    • (2010) Proc. 6th Int. Conf. WiCOM , pp. 1-4
    • Liu, Y.1    Jin, Z.2    Wang, Y.3
  • 31
    • 84962456983 scopus 로고    scopus 로고
    • Nov.
    • Kore K, Nov. 2014, Chopchop (experimental WEP attacks). Online]. Available: http://www.netstumbler.org/unix-linux/chopchopexperimental-wep-attacks-t12489.html
    • (2014) Chopchop (Experimental WEP Attacks)
    • Kore, K.1
  • 34
    • 84962342889 scopus 로고    scopus 로고
    • Nov.
    • Hirte attack, Nov. 2014. [Online]. Available: http://www.aircrack-ng.org/doku.php?id=airbase-ng#hirte-attack-in-access-point-mode
    • (2014) Hirte Attack
  • 35
    • 15044365053 scopus 로고    scopus 로고
    • IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput 802.11n-2009
    • IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput, IEEE Std. 802. 11n-2009, 2012. [Online]. Available: http://standards.ieee.org/getieee802/download/802.11n-2009.pdf
    • (2012) IEEE Std.
  • 36
    • 67349109409 scopus 로고    scopus 로고
    • Denial-of-service attacks and countermeasures in IEEE 802. 11 wireless networks
    • Sep.
    • K. Bicakci and B. Tavli, "Denial-of-service attacks and countermeasures in IEEE 802. 11 wireless networks," Comput. Standards Interfaces, vol. 31, no. 5, pp. 931-941, Sep. 2009.
    • (2009) Comput. Standards Interfaces , vol.31 , Issue.5 , pp. 931-941
    • Bicakci, K.1    Tavli, B.2
  • 37
    • 57849139767 scopus 로고    scopus 로고
    • A lightweight solution for defending against deauthentication/disassociation attacks on 802. 11 networks
    • T. D. Nguyen, D. Nguyen, B. N. Tran, H. Vu, and N. Mittal, "A lightweight solution for defending against deauthentication/disassociation attacks on 802. 11 networks," in Proc. 17th ICCCN, 2008, pp. 1-6.
    • (2008) Proc. 17th ICCCN , pp. 1-6
    • Nguyen, T.D.1    Nguyen, D.2    Tran, B.N.3    Vu, H.4    Mittal, N.5
  • 38
    • 24144468952 scopus 로고    scopus 로고
    • Efficiency analysis of burst transmissions with block ACK in contention-based 802. 11e WLANs
    • I. Tinnirello and S. Choi, "Efficiency analysis of burst transmissions with block ACK in contention-based 802. 11e WLANs," in Proc. IEEE ICC, 2005, vol. 5, pp. 3455-3460.
    • (2005) Proc. IEEE ICC , vol.5 , pp. 3455-3460
    • Tinnirello, I.1    Choi, S.2
  • 39
    • 84962342882 scopus 로고    scopus 로고
    • Review of a MPDU DoS Issue Nov.
    • Review of a MPDU DoS Issue, Nov. 2014. [Online]. Available: https://mentor.ieee.org/802.11/file/07/11-07-2163-01-000n-a-mpdu-securityissues.ppt
    • (2014)
  • 40
    • 77955856007 scopus 로고    scopus 로고
    • Empirical studies and queuing modeling of denial of service attacks against 802. 11 WLANs
    • C. Liu, J. Yu, and G. Brewster, "Empirical studies and queuing modeling of denial of service attacks against 802. 11 WLANs," in Proc. IEEE Int. Symp. WoWMoM, 2010, pp. 1-9.
    • (2010) Proc. IEEE Int. Symp. WoWMoM , pp. 1-9
    • Liu, C.1    Yu, J.2    Brewster, G.3
  • 42
    • 77953120156 scopus 로고    scopus 로고
    • Null data frame: A doubleedged sword in IEEE 802. 11 WLANs
    • Jul.
    • W. Gu, Z. Yang, D. Xuan, W. Jia, and C. Que, "Null data frame: A doubleedged sword in IEEE 802. 11 WLANs," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 7, pp. 897-910, Jul. 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.7 , pp. 897-910
    • Gu, W.1    Yang, Z.2    Xuan, D.3    Jia, W.4    Que, C.5
  • 43
    • 77952313042 scopus 로고    scopus 로고
    • Empirical analysis of virtual carrier sense flooding attacks over wireless local area network
    • M. Malekzadeh, A. A. Ghani, J. Desa, and S. Subramaniam, "Empirical analysis of virtual carrier sense flooding attacks over wireless local area network," J. Comput. Sci., vol. 5, no. 3, pp. 214-220, 2009.
    • (2009) J. Comput. Sci. , vol.5 , Issue.3 , pp. 214-220
    • Malekzadeh, M.1    Ghani, A.A.2    Desa, J.3    Subramaniam, S.4
  • 46
    • 4544221258 scopus 로고    scopus 로고
    • Access points vulnerabilities to DoS attacks in 802. 11 networks
    • F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access points vulnerabilities to DoS attacks in 802. 11 networks," in Proc. WCNC, 2004, pp. 634-638.
    • (2004) Proc. WCNC , pp. 634-638
    • Ferreri, F.1    Bernaschi, M.2    Valcamonici, L.3
  • 48
    • 77956604585 scopus 로고    scopus 로고
    • Who is peeping at your passwords at Starbucks? to catch an evil twin access point
    • Y. Song, C. Yang, and G. Gu, "Who is peeping at your passwords at Starbucks? To catch an evil twin access point," in Proc. IEEE/IFIP Int. Conf. DSN, 2010, pp. 323-332.
    • (2010) Proc. IEEE/IFIP Int. Conf. DSN , pp. 323-332
    • Song, Y.1    Yang, C.2    Gu, G.3
  • 49
    • 80053548870 scopus 로고    scopus 로고
    • Rogue-access-point detection: Challenges, solutions, future directions
    • Sep. /Oct.
    • R. Beyah and A. Venkataraman, "Rogue-access-point detection: Challenges, solutions, future directions," IEEE Security Privacy, vol. 9, no. 5, pp. 56-61, Sep. /Oct. 2011.
    • (2011) IEEE Security Privacy , vol.9 , Issue.5 , pp. 56-61
    • Beyah, R.1    Venkataraman, A.2
  • 50
    • 84962355934 scopus 로고    scopus 로고
    • Rap problems and solutions in 802. 11 wireless LAN
    • Jan.
    • A. M. Patel, A. R. Patel, and H. R. Patel, "Rap problems and solutions in 802. 11 wireless LAN," Int. J., vol. 2, no. 1, pp. 669-674, Jan. 2014.
    • (2014) Int. J. , vol.2 , Issue.1 , pp. 669-674
    • Patel, A.M.1    Patel, A.R.2    Patel, H.R.3
  • 52
    • 84962403910 scopus 로고    scopus 로고
    • Mdk3 Nov.
    • Mdk3, Nov. 2014. [Online]. Available: http://hack-it.org/index.php? title=Mdk3
    • (2014)
  • 53
    • 84962403909 scopus 로고    scopus 로고
    • File2air Nov.
    • File2air, Nov. 2014. [Online]. Available: http://www.willhackforsushi.com/?page-id=19
    • (2014)
  • 54
    • 84962472461 scopus 로고    scopus 로고
    • Lorcon-old source code Nov.
    • Lorcon-old source code, Nov. 2014. [Online]. Available: https://aur.archlinux.org/packages/lorcon-old-git/?setlang=en
    • (2014)
  • 55
    • 84962472469 scopus 로고    scopus 로고
    • Lorcon2 library Nov.
    • Lorcon2 library, Nov. 2014. [Online]. Available: https://code.google.com/p/lorcon
    • (2014)
  • 56
    • 84925368904 scopus 로고    scopus 로고
    • 802. 11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802. 11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX Security, 2003, pp. 15-28.
    • (2003) Proc. USENIX Security , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 59
    • 84962472455 scopus 로고    scopus 로고
    • Metasploit Nov.
    • Metasploit, Nov. 2014. [Online]. Available: http://www.metasploit.com
    • (2014)
  • 60
    • 84962353506 scopus 로고    scopus 로고
    • Wireshark Nov.
    • Wireshark, Nov. 2014. [Online]. Available: http://www.wireshark.org
    • (2014)
  • 63
    • 84919328325 scopus 로고    scopus 로고
    • Role of feature selection in intrusion detection systems for 802. 11 networks
    • N. P. Neelakantan and C. Nagesh, "Role of feature selection in intrusion detection systems for 802. 11 networks," Int. J. Smart Sensors Ad Hoc Netw., vol. 1, no. 1, pp. 98-101, 2011.
    • (2011) Int. J. Smart Sensors Ad Hoc Netw. , vol.1 , Issue.1 , pp. 98-101
    • Neelakantan, N.P.1    Nagesh, C.2
  • 64
    • 78751649037 scopus 로고    scopus 로고
    • DoS attacks exploiting signaling in UMTS and IMS
    • G. Kambourakis, C. Kolias, S. Gritzalis, and J. H. Park, "DoS attacks exploiting signaling in UMTS and IMS," Comput. Commun., vol. 34, no. 3, pp. 226-235, 2011.
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 226-235
    • Kambourakis, G.1    Kolias, C.2    Gritzalis, S.3    Park, J.H.4
  • 65
    • 84873738656 scopus 로고    scopus 로고
    • Attacks and countermeasures on 802. 16: Analysis and assessment
    • C. Kolias, G. Kambourakis, and S. Gritzalis, "Attacks and countermeasures on 802. 16: Analysis and assessment," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 487-514, 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.1 , pp. 487-514
    • Kolias, C.1    Kambourakis, G.2    Gritzalis, S.3
  • 66
    • 80955142722 scopus 로고    scopus 로고
    • Swarm intelligence in intrusion detection: A survey
    • C. Kolias, G. Kambourakis, and M. Maragoudakis, "Swarm intelligence in intrusion detection: A survey," Comput. Security, vol. 30, no. 8, pp. 625-642, 2011.
    • (2011) Comput. Security , vol.30 , Issue.8 , pp. 625-642
    • Kolias, C.1    Kambourakis, G.2    Maragoudakis, M.3
  • 67
    • 65249107163 scopus 로고    scopus 로고
    • A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
    • Jan. /Feb.
    • J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection," IEEE Netw., vol. 23, no. 1, pp. 42-47, Jan. /Feb. 2009.
    • (2009) IEEE Netw. , vol.23 , Issue.1 , pp. 42-47
    • Hu, J.1    Yu, X.2    Qiu, D.3    Chen, H.-H.4
  • 68
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S. X. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Appl. Soft Comput., vol. 10, no. 1, pp. 1-35, 2010.
    • (2010) Appl. Soft Comput. , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.