WiFi Intrusion Detection and Prevention Systems Analyzing: A Game Theoretical Perspective
- 11 Downloads
WiFi is the de-facto wireless standard which suffers from a significant security vulnerability. Indeed, the WiFi management frames are not sent via an encrypted channel. However, many studies have been conducted to face this issue, but, preparing a comprehensive model for assessing the performance of these systems under different conditions is a research gap. In this paper, we propose an Abstract WIDPS with a useful but straightforward response function in confronting management frames transferring in an insecure channel. Indeed, we model the interaction between the entities involved in the problem based on game theory and propose a performance evaluation method for WIDPS depending on the network application context and the importance of confidentiality, integrity, and availability as the three principles of information security. This model provides an innovative solution for WIDPS qualitative classification. Finally, we evaluate the proposed method in several different samples, which obtains efficient results for classification and tuning of WIDPSs.
KeywordsIEEE 802.11x WiFi Intrusion Detection and Prevention System (IDPS) Game theory
- 1.Cisco visual networking index. Forecast and methodology, 20162021—cisco. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html. Accessed 19 Oct 2018.
- 2.I.C.S.L.M.S. Committee, et al., ANSI/IEEE Std. 802.11-1999, 1999.Google Scholar
- 3.T.D. Nguyen, D.H. Nguyen, B.N. Tran, H. Vu, and N. Mittal, In: 2008 Proceedings of 17th international conference on computer Communications and networks IEEE, New York, pp. 1–6, 2008.Google Scholar
- 6.K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication, Vol. 800, No. 2007, p. 94, 2007.Google Scholar
- 7.R. Myerson, Game Theory. Harvard University Press, Cambridge, 2013. https://books.google.com/books?id=oGUET9JBytEC.
- 10.K. Leyton-Brown, and Y. Shoham, Essentials of Game Theory: A Concise, Multidisciplinary Introduction. Synthesis lectures on artificial intelligence and machine learning. Morgan & Claypool Publishers, 2008. https://books.google.com/books?id=u8sDLATVJikC.
- 11.B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 221–226, 2006.Google Scholar
- 12.B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 215–220, 2006.Google Scholar
- 14.M. Malekzadeh, A. A. A. Ghani, J. Desa and S. Subramaniam, An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks, IJCSNS, Vol. 8, No. 8, p. 1, 2008.Google Scholar
- 16.H. Hwang, G. Jung, K. Sohn, and S. Park, In International Conference on Information Science and Security, 2008. ICISS. IEEE, New York, pp. 164–170, 2008.Google Scholar
- 17.K. Bauer, H. Gonzales, and D. McCoy, In IEEE International Performance, computing and communications conference, 2008. IPCCC 2008. IEEE, New York, pp. 513–516, 2008.Google Scholar
- 18.S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, In Proceedings of the first ACM conference on Wireless network security. ACM, New York, pp. 56–61, 2008.Google Scholar
- 19.G. Chen, H. Yao, and Z. Wang, In Second International Conference on Future Networks, 2010. ICFN’10. IEEE, New York, pp. 168–172, 2010.Google Scholar
- 22.N. Sharma, P. N. Barwal and C. Noida, Study of DoS Attacks on IEEE 802. 11 WLAN and its prevention/detection techniques, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 3, No. 3, p. 245, 2014.Google Scholar
- 23.P. Kavitha and M. Usha, Anomaly based intrusion detection in wlan using discrimination Algorithm combined with Naive Bayesian Classifier Naive Bayesian Classifier, Journal of Theoretical & Applied Information Technology, Vol. 62, p. 1, 2014.Google Scholar
- 25.N. Baharudin, F.H.M. Ali, M.Y. Darus, and N. Awang, In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, New York, pp. 1–5, 2015.Google Scholar
- 27.A. Kumar, P. Paul, In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT). IEEE, New York, pp. 176–181, 2016.Google Scholar
- 28.M.A.C. Aung, and K.P. Thant, In 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, New York, pp. 173–178, 2017.Google Scholar