Advertisement

Mathematical Model and Formalization for DTF Method

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 195)

Abstract

This paper defines a mathematical model for the Destination Traffic Fingerprint method (DTF). The entire process is seen as a system, composed by a certain number of subsystems. As a system, it has input and output function, depending on the time variable. Then, each component is viewed as a subsystem, with input and output functions.

Keywords

KDTF Method MAC Spoofing Intrusion Detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Sasu, E.C., Prostean, O.: Using Constant Traffic to Specific IP Destinations for Detecting Spoofed MAC Addresses in Local Area Networks. In: IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics, Timisoara, Romania, pp. 677–681 (2010)Google Scholar
  2. 2.
    Sasu, E.C., Prostean, O., Groza, V.: Proving the Efficiency of DTF Method in a Local Area Network. In: IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics, Timisoara, Romania, pp. 683–687 (2010)Google Scholar
  3. 3.
    Sasu, E.C., Prostean, O.: Testing DTF Method for Applicability in a Real Environment. In: 7th IEEE International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, pp. 285–289 (2012)Google Scholar
  4. 4.
    Sasu, E.C., Prostean, O.: Network Simulation for MAC Spoofing Detection, using DTF Method. In: 7th IEEE International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, pp. 291–296 (2012)Google Scholar
  5. 5.
    WinPcap driver, http://www.winpcap.org/
  6. 6.
    Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active Behavioral Fingerprinting of Wireless Devices. In: WiSec 2008, Alexandria, Virginia, USA, pp. 56–61 (2008)Google Scholar
  7. 7.
    Wang, H., Jin, C., Shin, K.G.: Defense Against Spoofed IP Traffic Using Hop-Count Filtering. IEEE/ACM Transactions on Networking 15(1), 40–53 (2006)CrossRefGoogle Scholar
  8. 8.
    Loh, D.C.C., Cho, C.Y., Tan, C.P., Lee, R.S.: Identifying Unique Devices through Wireless Fingerprinting. In: WiSec 2008, Alexandria, Virginia, USA, pp. 104–115 (2008)Google Scholar
  9. 9.
    Jana, S., Kasera, S.K.: On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews. In: MobiCom 2008, San Francisco, California, USA, pp. 46–55 (2008)Google Scholar
  10. 10.
    Wei, W., Suh, K., Wang, B., Gu, Y., Kurose, J., Towsley, D.: Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs. In: IMC 2007, San Diego, California, USA, pp. 365–378 (2007)Google Scholar
  11. 11.
    Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless Device Identification with Radiometric Signatures. In: MobiCom 2008, San Francisco, California, USA, pp. 46–55 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.“Politehnica” UniversityTimisoaraRomania

Personalised recommendations