Show simple item record

dc.contributor.convenorArek Dadejen_AU
dc.contributor.authorSithirasenan, Elankayeren_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.editorArek Dadejen_US
dc.date.accessioned2017-05-03T13:58:41Z
dc.date.available2017-05-03T13:58:41Z
dc.date.issued2007en_US
dc.date.modified2008-11-25T05:38:06Z
dc.identifier.refurihttp://www.plevin.com.au/ICON2007/en_AU
dc.identifier.doi10.1109/ICON.2007.4444063en_AU
dc.identifier.urihttp://hdl.handle.net/10072/17592
dc.description.abstractWith the increasing dependence on wireless LANs (WLANs), businesses and educational institutions are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. Nevertheless, fresh security threats are emerging often to oust these new defense mechanisms. Further, many organizations based on superficial vendor literature, believe their wireless security is sufficient enough to prevent any unauthorized access. Having wide ranging options for security configurations, users are camouflaged into deep uncertainty. This volatile state of affairs has prevented many organizations from fully deploying WLANs for their secure communication needs, though WLANs may be cost effective and flexible. In this paper, we present an anomaly based mechanism to detect both known and emerging security threats in WLANs. Our method uses both timing and behavioral anomalies. We first look for timing and/or behaviour anomalies during the security association process and then use outlier based data association approaches to verify their legitimacy. The proposed concept was tested on our experimental setup and the results obtained from EAP-LEAP and EAP-PEAP authenticated hosts are presented here.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent238894 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherIEEEen_US
dc.publisher.placeUSAen_US
dc.publisher.urihttp://www.ieee.org/en_AU
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencename2007 15th IEEE International Conference on Networksen_US
dc.relation.ispartofconferencetitleProceedings of the 2007 15th IEEE International Conference on Networksen_US
dc.relation.ispartofdatefrom2007-11-19en_US
dc.relation.ispartofdateto2007-11-21en_US
dc.relation.ispartoflocationAdelaide, Australiaen_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchHISTORY AND ARCHAEOLOGYen_US
dc.subject.fieldofresearchcode210000en_US
dc.titleDetecting Security Threats in Wireless LANs Using Timing and Behavioral Anomaliesen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.rights.copyrightCopyright 2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_AU
gro.date.issued2007
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record