DocumentCode :
589794
Title :
PCPD: A novel illustration of pivotal parameters of an attack for security systems: Case study on IEEE 802.11 MAC layer misbehavior
Author :
Modaresi, A. ; Koozehkanani, Ziaddin Daei ; Zolfy, M.
Author_Institution :
Fac. of Electr. & Comput. Eng., Univ. of Tabriz, Tabriz, Iran
fYear :
2012
fDate :
13-14 Sept. 2012
Firstpage :
141
Lastpage :
146
Abstract :
To confront an attack, a good strategy may save the cost and time. When Detecting and reacting is known to handle predictable naïve attacks, prevention strategies should be used to deal with smart unknown ones. These are defined types of misbehavior in wireless MAC layer protocols. To study MAC layer misbehavior in IEEE 802.11 networks more systematically, we defined a framework named PCPD. This methodology introduces four parameters, Possibility, Cost, Profit, and Damage to delineate any assumed attack or threat. By studying these parameters together, it becomes clear what are the most probable and considerable misbehaviors, how much damage they can make, what are profits and cost of such a behavior for the hostile host, and so how much essential is to tackle it. Comparison of PCPD parameters for different types of misbehavior results in a comprehensible identification of their severity, network´s reliability, and network´s weak points. By recognizing these parameters one can easily go through designing an accurate handling method for any threat.
Keywords :
authorisation; computer network security; wireless LAN; IEEE 802.11 MAC layer misbehavior; IEEE 802.11 network; MAC layer misbehavior; PCPD framework; cost parameter; damage parameter; medium access control; network reliability; possibility parameter; predictable naive attack; profit parameter; security system attack; Communication system security; IEEE 802.11 Standards; Media Access Protocol; Security; Wireless networks; Cost; Damage of an attack; IEEE 802.11; MAC layer misbehavior; PCPD; Probability; Profit; detection; prevention method; reaction; wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location :
Tabriz
Print_ISBN :
978-1-4673-2387-1
Type :
conf
DOI :
10.1109/ISCISC.2012.6408209
Filename :
6408209
Link To Document :
بازگشت