Lightweight Wireless Intrusion Detection Systems Against DDoS Attack

Wireless intrusion detection systems are important to the security of wireless local area networks (WLANs). Wireless networks are not only susceptible to TCP/IP-based attacks native to wired networks, they are also subject to a wide array of 802.11-specific threats. To aid in the defense and detection of these potential threats, WLANs should employ a security solution that includes an intrusion detection system(IDS). Intrusion detection systems attempt to identify computer system and network intrusions and misuse by gathering and analyzing data. IDS has traditionally been developed to detect intrusions and misuse for wired systems and networks. In this paper, we suggest lightweight wireless IDS module on AP with network monitoring, analysis and filtering module against malicious DDoS attacks. Suggested system provides good performance on wireless LAN environments.

[1]  Vasant Honavar,et al.  Lightweight agents for intrusion detection , 2003, J. Syst. Softw..

[2]  Jizhou Sun,et al.  Intrusion detection solution to WLANs , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[3]  Henry L. Owen,et al.  Wireless intrusion detection and response , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[4]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[5]  Jizhou Sun,et al.  Intrusion detection for wireless local area network , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[6]  Giac Security Essentials Wireless Intrusion Detection Systems , 2005 .

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  R Schmoyer Timothy,et al.  Wireless intrusion detection and response : A case study using the classic man-in-the-middle attack , 2004 .

[9]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .