A data fusion technique to detect wireless network virtual jamming attacks

Wireless communications are potentially exposed to jamming due to the openness of the medium and, in particular, to virtual jamming, which allows more energy-efficient attacks. In this paper we tackle the problem of virtual jamming attacks on IEEE 802.11 networks and present a data fusion solution for the detection of a type of virtual jamming attack (namely, NAV attacks), based on the real-time monitoring of a set of metrics. The detection performance is evaluated in a number of real scenarios.

[1]  Andrea Bondavalli,et al.  A methodology and supporting techniques for the quantitative assessment of insider threats , 2013, DISCCO '13.

[2]  Antonio Pescapè,et al.  Early Classification of Network Traffic through Multi-classification , 2011, TMA.

[3]  A. Y. Dak,et al.  A novel framework for jamming detection and classification in wireless networks , 2012, 2012 8th International Conference on Computing and Networking Technology (INC, ICCIS and ICMIC).

[4]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[5]  Alexander M. Wyglinski,et al.  A combined approach for distinguishing different types of jamming attacks against wireless networks , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[6]  Andrea Bondavalli,et al.  Insider Threat Assessment: a Model-Based Methodology , 2014, OPSR.

[7]  Deborah A. Frincke,et al.  Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory , 2005, ACM-SE 43.

[8]  栄 久米原,et al.  Wiresharkパケット解析リファレンス : Network Protocol Analyzer , 2009 .

[9]  Pramod K. Varshney,et al.  Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming , 2003 .

[10]  Carey L. Williamson,et al.  Ambient Interference Effects in Wi-Fi Networks , 2010, Networking.

[11]  M. Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).

[12]  Konstantinos G. Kyriakopoulos,et al.  A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignment , 2012, World Congress on Internet Security (WorldCIS-2012).

[13]  Maxim Raya,et al.  DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.

[14]  Alexandros G. Fragkiadakis,et al.  Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..

[15]  Andrea Bondavalli,et al.  Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform , 2015, PASM.

[16]  Geethapriya Thamilarasu,et al.  A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.