In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting attacks at the physical layer of wireless networks, by seeking for changes in the Signal-to-Noise ratio statistical characteristics. Two types of algorithms are proposed: simple threshold algorithms and cumulative sum (cusum) algorithms. Performance evaluation is performed in terms of the detection probability, false alarm rate, detection delay and the robustness of the algorithms to different detection threshold values. The algorithms are applied locally to measurements collected from three locations of an experimental network and under two attack intensities. The results show that the cumulative sum algorithms are more robust and achieve higher performance under both attack intensities. Next, we use the Dempster-Shafer algorithm to fuse the outputs provided by the above locally executed algorithms at different nodes, thus forming a collaborative intrusion detection system. The evaluation shows that the robustness substantially increases while the performance remains high, for both types of attacks.
Description
IEEE Xplore - Effective and robust detection of jamming attacks
%0 Conference Paper
%1 Fragkiadakis10
%A Fragkiadakis, Alexandros G.
%A Siris, Vasilios A.
%A Traganitis, Apostolos P.
%B Future Network and MobileSummit 2010 Conference Proceedings
%D 2010
%K detection experimental jamming security
%P 1-8
%T Effective and robust detection of jamming attacks
%U http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5722371
%X In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting attacks at the physical layer of wireless networks, by seeking for changes in the Signal-to-Noise ratio statistical characteristics. Two types of algorithms are proposed: simple threshold algorithms and cumulative sum (cusum) algorithms. Performance evaluation is performed in terms of the detection probability, false alarm rate, detection delay and the robustness of the algorithms to different detection threshold values. The algorithms are applied locally to measurements collected from three locations of an experimental network and under two attack intensities. The results show that the cumulative sum algorithms are more robust and achieve higher performance under both attack intensities. Next, we use the Dempster-Shafer algorithm to fuse the outputs provided by the above locally executed algorithms at different nodes, thus forming a collaborative intrusion detection system. The evaluation shows that the robustness substantially increases while the performance remains high, for both types of attacks.
@inproceedings{Fragkiadakis10,
abstract = {In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting attacks at the physical layer of wireless networks, by seeking for changes in the Signal-to-Noise ratio statistical characteristics. Two types of algorithms are proposed: simple threshold algorithms and cumulative sum (cusum) algorithms. Performance evaluation is performed in terms of the detection probability, false alarm rate, detection delay and the robustness of the algorithms to different detection threshold values. The algorithms are applied locally to measurements collected from three locations of an experimental network and under two attack intensities. The results show that the cumulative sum algorithms are more robust and achieve higher performance under both attack intensities. Next, we use the Dempster-Shafer algorithm to fuse the outputs provided by the above locally executed algorithms at different nodes, thus forming a collaborative intrusion detection system. The evaluation shows that the robustness substantially increases while the performance remains high, for both types of attacks.},
added-at = {2013-09-26T10:27:18.000+0200},
author = {Fragkiadakis, Alexandros G. and Siris, Vasilios A. and Traganitis, Apostolos P.},
biburl = {https://www.bibsonomy.org/bibtex/20aeb8dbcfa12708f02f99d00aeb31130/affitz},
booktitle = {Future Network and MobileSummit 2010 Conference Proceedings},
description = {IEEE Xplore - Effective and robust detection of jamming attacks},
interhash = {818abcbf47ad8a59884d61ee86e84b52},
intrahash = {0aeb8dbcfa12708f02f99d00aeb31130},
keywords = {detection experimental jamming security},
pages = {1-8},
timestamp = {2013-09-26T10:47:20.000+0200},
title = {Effective and robust detection of jamming attacks},
url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5722371},
year = 2010
}