DocumentCode :
970259
Title :
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships
Author :
Li, Qing ; Trappe, Wade
Author_Institution :
Rutgers Univ., Piscataway
Volume :
2
Issue :
4
fYear :
2007
Firstpage :
793
Lastpage :
808
Abstract :
Many wireless networks are susceptible to spoofing attacks. Conventionally, ensuring the identity of the communicator and detecting an adversarial presence is performed via device authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management and more extensive computations. In this paper, we propose noncryptographic mechanisms that are complementary to authentication and can detect device spoofing with little or no dependency on cryptographic keys. We introduce forge-resistant relationships associated with transmitted packets, and forge-resistant consistency checks, which allow other network entities to detect anomalous activity. We then provide several practical examples of forge-resistant relationships for detecting anomalous network activity. We explore the use of monotonic relationships in the sequence number fields, the use of a supplemental identifier field that evolves in time according to a reverse one-way function chain, and the use of traffic statistics to differentiate between anomalous traffic and congestion. We then show how these relationships can be used to construct classifiers that provide a multilevel threat assessment. We validate these methods through experiments conducted on the ORBIT wireless testbed.
Keywords :
message authentication; statistical analysis; telecommunication security; telecommunication traffic; wireless LAN; IEEE 802.11; anomalous network traffic; device authentication; forge-resistant consistency check; forge-resistant relationship; multilevel threat assessment; noncryptographic mechanism; reverse one-way function chain; spoofing attack detection; statistics; wireless network; Authentication; Communication system security; Computer crime; Cryptography; Intrusion detection; Media Access Protocol; Statistics; Telecommunication traffic; Testing; Wireless networks; Authentication; intrusion detection; security; spoofing attacks;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2007.910236
Filename :
4380300
Link To Document :
بازگشت