Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Real-time detection of traffic anomalies in wireless mesh networks

Zaidi, Zainab R. ; Hakami, Sara ; Landfeldt, Björn LU and Moors, Tim (2010) In Wireless Networks 16(6). p.1675-1689
Abstract
Anomaly detection is emerging as a necessary component as wireless networks gain popularity. Anomaly detection has been addressed broadly in wired networks and powerful methods have been developed for correct detection of a variety of known attacks and other anomalies. In this paper, we propose a real-time anomaly detection and identification scheme for wireless mesh networks (WMN) using components from previous methods developed for wired networks. Experiments over a WMN testbed show the effectiveness of the proposed scheme in isolating different types of anomalies, such as Denial-of-service attacks, port scan attacks, etc. Our scheme uses Chi-square statistics and it is based on similar ideas as the scheme presented by Lakhina et al.... (More)
Anomaly detection is emerging as a necessary component as wireless networks gain popularity. Anomaly detection has been addressed broadly in wired networks and powerful methods have been developed for correct detection of a variety of known attacks and other anomalies. In this paper, we propose a real-time anomaly detection and identification scheme for wireless mesh networks (WMN) using components from previous methods developed for wired networks. Experiments over a WMN testbed show the effectiveness of the proposed scheme in isolating different types of anomalies, such as Denial-of-service attacks, port scan attacks, etc. Our scheme uses Chi-square statistics and it is based on similar ideas as the scheme presented by Lakhina et al. although it has lower computational complexity. The original method by Lakhina et al. was developed for wired networks and used Principal Component Analysis (PCA) for reducing the dimensions of observed data and Hotelling’s t 2 statistics to distinguish between normal and abnormal traffic conditions. However, in our studies we found that dimension reduction is the most computationally intensive process of the scheme. In this paper we propose an alternative way of reducing dimensions using flow variances in a Chi-square test. Experimental results show that the Chi-square test performs similarly well to the PCA-based method at merely a fraction of the computations. Moreover, we propose an automatic identification scheme to pin-point the cause of the detected anomaly and its contribution in terms of additional or lack of traffic. Our results and comparison with other statistical tools show that the Chi-square test and the PCA-based method with identification scheme make powerful tools for real-time detection of various anomalies in an interference prone wireless networking environment. (Less)
Please use this url to cite or link to this publication:
author
; ; and
publishing date
type
Contribution to journal
publication status
published
subject
in
Wireless Networks
volume
16
issue
6
pages
1675 - 1689
publisher
J.C. Baltzer AG, Science Publishers
external identifiers
  • scopus:77957872500
ISSN
1022-0038
DOI
10.1007/s11276-009-0221-y
language
English
LU publication?
no
id
7f8bd430-56ae-4ec6-b606-2014a8e00fbc (old id 3129965)
date added to LUP
2016-04-01 14:19:46
date last changed
2022-01-28 00:02:05
@article{7f8bd430-56ae-4ec6-b606-2014a8e00fbc,
  abstract     = {{Anomaly detection is emerging as a necessary component as wireless networks gain popularity. Anomaly detection has been addressed broadly in wired networks and powerful methods have been developed for correct detection of a variety of known attacks and other anomalies. In this paper, we propose a real-time anomaly detection and identification scheme for wireless mesh networks (WMN) using components from previous methods developed for wired networks. Experiments over a WMN testbed show the effectiveness of the proposed scheme in isolating different types of anomalies, such as Denial-of-service attacks, port scan attacks, etc. Our scheme uses Chi-square statistics and it is based on similar ideas as the scheme presented by Lakhina et al. although it has lower computational complexity. The original method by Lakhina et al. was developed for wired networks and used Principal Component Analysis (PCA) for reducing the dimensions of observed data and Hotelling’s t 2 statistics to distinguish between normal and abnormal traffic conditions. However, in our studies we found that dimension reduction is the most computationally intensive process of the scheme. In this paper we propose an alternative way of reducing dimensions using flow variances in a Chi-square test. Experimental results show that the Chi-square test performs similarly well to the PCA-based method at merely a fraction of the computations. Moreover, we propose an automatic identification scheme to pin-point the cause of the detected anomaly and its contribution in terms of additional or lack of traffic. Our results and comparison with other statistical tools show that the Chi-square test and the PCA-based method with identification scheme make powerful tools for real-time detection of various anomalies in an interference prone wireless networking environment.}},
  author       = {{Zaidi, Zainab R. and Hakami, Sara and Landfeldt, Björn and Moors, Tim}},
  issn         = {{1022-0038}},
  language     = {{eng}},
  number       = {{6}},
  pages        = {{1675--1689}},
  publisher    = {{J.C. Baltzer AG, Science Publishers}},
  series       = {{Wireless Networks}},
  title        = {{Real-time detection of traffic anomalies in wireless mesh networks}},
  url          = {{http://dx.doi.org/10.1007/s11276-009-0221-y}},
  doi          = {{10.1007/s11276-009-0221-y}},
  volume       = {{16}},
  year         = {{2010}},
}