Skip to main content

Isolation of Multiple Anonymous Attackers in Mobile Networks

  • Conference paper
  • First Online:
Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9408))

Included in the following conference series:

Abstract

Many mobile wireless networks unintentionally provide opportunity for attackers to launch anonymous attacks or spoof other users, often without fear of being caught. It’s often ideal for network carriers to block all traffic from an attacker, not just the attack traffic, for example to stop any concurrent attacks which cannot be detected by the carrier. We present an approach to detect common attacks at the access point, and leverage this with packet clustering to block all traffic originating from attackers during an attack. To achieve packet clustering, we utilize received signal strength at the access point to properly cluster attack packets according to each unique attacker, and further classify all other packets according to these clusters. Our approach is designed with attacker and legitimate user mobility in mind, low memory overhead, and is scalable to many simultaneous attackers. Our experimental results show very high classification accuracy, sensitivity and specificity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, Y., Terzis, A.: On the mechanisms and effects of calibrating RSSI measurements for 802.15.4 radios. In: Silva, J.S., Krishnamachari, B., Boavida, F. (eds.) EWSN 2010. LNCS, vol. 5970, pp. 256–271. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  2. Faria, D.B., Cheriton, D.R.: Detecting identity-based attacks in wireless networks using signalprints. In: Proceedings of the 5th ACM Workshop on Wireless Security. WiSe 2006, pp. 43–52. ACM, New York (2006)

    Google Scholar 

  3. Guo, F., Chiueh, T.: Sequence number-based MAC address spoof detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 309–329. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Handley, M., Paxson, V., Kreibich, C.: Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In: Proceedings of the 10th Conference on USENIX Security Symposium. SSYM 2001, vol. 10, pp. 9–9. USENIX Association, Berkeley (2001). http://dl.acm.org/citation.cfm?id=1267612.1267621

  5. Iannucci, B., Tague, P., Mengshoel, O.J., Lohn, J.: Crossmobile: A cross-layer architecture for next-generation wireless systems. Tech. Rep. CMU-SV-14-001, Carnegie Institute of Technology (March 2014)

    Google Scholar 

  6. Ling, Y., Gu, Y., Wei, G.: Detect syn flooding attack in edge routers. International Journal of Security and its Applications 3(1) (January 2009)

    Google Scholar 

  7. Lui, G., Gallagher, T., Li, B., Dempster, A., Rizos, C.: Differences in RSSI readings made by different wi-fi chipsets: a limitation of WLAN localization. In: 2011 International Conference on Localization and GNSS (ICL-GNSS), pp. 53–57, June 2011

    Google Scholar 

  8. Sheng, Y., Tan, K., Chen, G., Kotz, D., Campbell, A.: Detecting 802.11 MAC layer spoofing using received signal strength. In: The 27th Conference on Computer Communications. INFOCOM 2008. IEEE, April 2008

    Google Scholar 

  9. Sugano, M.: Indoor localization system using RSSI measurement of wireless sensor network based on zigbee standard. In: Wireless and Optical Communications, pp. 1–6. IASTED/ACTA Press (2006)

    Google Scholar 

  10. Varga, A., Hornig, R.: An overview of the omnet++ simulation environment. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops. Simutools 2008, pp. 60:1–60:10. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, Belgium (2008)

    Google Scholar 

  11. Wang, H., Zhang, D., Shin, K.: Detecting SYN flooding attacks. In: Proceedings of IEEE INFOCOM, vol. 3, pp. 1530–1539 (2002)

    Google Scholar 

  12. Wessels, A., Wang, X., Laur, R., Lang, W.: Dynamic indoor localization using multilateration with RSSI in wireless sensor networks for transport logistics. Procedia Engineering 5, 220–223 (2010). eurosensor XXIV Conference

    Article  Google Scholar 

  13. Xiao, B., Chen, W., He, Y., Sha, E.H.M.: An active detecting method against SYN flooding attack. In: The 11th IEEE International Conference on Parallel and Distributed Systems (ICPADS 2005), vol. 1, pp. 709–715, July 2005

    Google Scholar 

  14. Yang, J., Chen, Y., Trappe, W.: Detecting spoofing attacks in mobile wireless environments. In: 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. SECON 2009, pp. 1–9, June 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brian Ricks .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ricks, B., Tague, P. (2015). Isolation of Multiple Anonymous Attackers in Mobile Networks. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science(), vol 9408. Springer, Cham. https://doi.org/10.1007/978-3-319-25645-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25645-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25644-3

  • Online ISBN: 978-3-319-25645-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics