Skip to main content

Defence Against 802.11 DoS Attacks Using Artificial Immune System

  • Conference paper
Artificial Immune Systems (ICARIS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4628))

Included in the following conference series:

Abstract

In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security framework can counter de-authentication and disassociation attacks. The results of our experiments clearly demonstrate that the proposed framework approximately achieved 100% detection rate with negligible false positive rate. One can conclude from the ROC (Receiver Operating Characteristics) plots of our AIS that its performance approaches ‘perfect classification point’ at a suitable matching threshold value.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)

    MATH  Google Scholar 

  2. Hofmeyr, S.A., Forrest, S.: Architecture for an Artificial Immune System. Evoloutionary Computation Journal, 443–473 (2000)

    Google Scholar 

  3. Kim, J., Bentley, P.J.: Investigating the Roles of Negative Selection in an AIS for NID. IEEE Transactions of Evolutionary Computing, Special Issue on AIS (2001)

    Google Scholar 

  4. ISO Standard 7498-1:1994, standards.iso.org/iso/

  5. ANSI/IEEE Std 802.11, 1999 edn. (R2003), standards.ieee.org/getieee802/802.11.html

  6. Balachandran, S., Dasgupta, D., Wang, L.: A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks. Published in Symposium on Information Assurance, New York (June 14-15, 2006)

    Google Scholar 

  7. Kaniganti, M.: An Agent-Based Intrusion Detection System for Wireless LANs, Masters Thesis, Advisor: Dr. Dipankar Dasgupta, The University of Memphis (December 2003)

    Google Scholar 

  8. Sarafijanovic, S., Le Boudec, J.-Y.: An Artificial Immune System for Misbehavior Detection in Mobile Ad-Hoc Networks with Virtual Thymus, Clustering, Danger Signal and Memory Detectors. In: 3rd International Conference on Artificial Immune Systems, pp. 342–356 (2004)

    Google Scholar 

  9. LaRoche, P., Zincir-Heywood, A.N.: 802.11 De-authentication Attack Detection using Genetic Programming. In: Collet, P., Tomassini, M., Ebner, M., Gustafson, S., Ekárt, A. (eds.) EuroGP 2006. LNCS, vol. 3905, Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. LaRoche, P., Zincir-Heywood, A.N.: 802.11 Network Intrusion Detection using Genetic Programming. In: GECCO, Workshop Program (2005)

    Google Scholar 

  11. LaRoche, P., Zincir-Heywood, A.N.: Genetic Programming Based WiFi Data Link Layer Attack Detection. In: IEEE 4th Annual Communication Networks and Services Research Conference (2006)

    Google Scholar 

  12. Ethreal: www.ethereal.com/

  13. SMAC: www.klcconsulting.net/smac/

  14. Snort- the de facto standard for Intrusion detection/prevention: www.snort.org

  15. Fawcett, T.: ROC Graphs Notes and Practical Considerations for Researchers, HP Laboratories (March 16, 2004)

    Google Scholar 

  16. He, C., Mitchel, J.C: Security Analysis and Improvements for IEEE 802.11i, Network and Distributed System. In: Security Symposium Conference Proceedings (2005)

    Google Scholar 

  17. Arbaugh, W.A., Shankar, N., Wang, J.: Your 802.11 Network has no Clothes. In: Proceedings of the First IEEE International Conference on Wireless LANs and Home Networks, pp. 131–144. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  18. Bellardo, J., Savage, S.: 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions. In: Proceedings of the USENIX Security Symposium, pp. 15–28 (2003)

    Google Scholar 

  19. Lee, Y.-S., Chien, H.-T., Tsai, W.-N.: Using Random Bit Auhentication to Defend IEEE 802.11 DoS Attacks. ICS, Taiwan (2006)

    Google Scholar 

  20. Wedde, H.F., Timm, C., Farooq, M.: Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems. In: PPSN, pp. 623–632 (2006)

    Google Scholar 

  21. Mazhar, N., Farooq, M.: BeeAIS: Artificial Immune System Security for Nature Inspired, MANET Routing Protocol, BeeAdHoc. In: ICARIS-2007, Brazil (in press)

    Google Scholar 

  22. Shafiq, M.Z., Kiani, M., Hashmi, B., Farooq, M.: Extended Thymus Action for Reducing False-Positives in AIS based Network Intrusion Detection Systems. In: GECCO-2007, London (in press)

    Google Scholar 

  23. Shafiq, M.Z., Kiani, M., Hashmi, B., Farooq, M.: Extended Thymus Action for Improving the response of AIS based NID against Malicious Traffic. In: CEC-2007, Singapore (in press)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Leandro Nunes de Castro Fernando José Von Zuben Helder Knidel

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shafiq, M.Z., Farooq, M. (2007). Defence Against 802.11 DoS Attacks Using Artificial Immune System. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds) Artificial Immune Systems. ICARIS 2007. Lecture Notes in Computer Science, vol 4628. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73922-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73922-7_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73921-0

  • Online ISBN: 978-3-540-73922-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics