Show simple item record

dc.contributor.convenorRichard W Miller
dc.contributor.authorSithirasenan, Elankayer
dc.contributor.authorMuthukkumarasamy, Vallipuram
dc.contributor.editorRichard W Miller
dc.date.accessioned2017-05-03T13:58:46Z
dc.date.available2017-05-03T13:58:46Z
dc.date.issued2008
dc.date.modified2009-05-12T06:40:17Z
dc.identifier.isbn9781424423248
dc.identifier.issn1930-529X
dc.identifier.refuriwww.ieee-globecom.org/2008
dc.identifier.doi10.1109/GLOCOM.2008.ECP.420
dc.identifier.urihttp://hdl.handle.net/10072/22894
dc.description.abstractWith the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. Nevertheless, fresh security threats are emerging often to oust these new defense mechanisms. Further, many organizations based on superficial vendor literature, believe their wireless security is sufficient enough to prevent any unauthorized access. Having wide ranging options for security configurations, users are camouflaged into profound uncertainty. This volatile state of affairs has prevented many organizations from fully deploying WLANs for their secure communication needs, though WLANs may be cost effective and flexible. In this paper, we present an anomaly based mechanism to detect and substantiate both known and unknown security threats in WLANs. Our method exploits both timing and behavioral anomalies. We first observe for timing and/or behavior anomalies during the security association process and use outlier based data association approaches to substantiate their legitimacy. The proposed concept was tested on our experimental setup and the results obtained from EAP TLS authenticated hosts are presented here.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent175068 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherIEEE Communications Society
dc.publisher.placeNew York, USA
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencenameIEEE Global Telecommunications Conference (GLOBECOM 08)
dc.relation.ispartofconferencetitleGLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE
dc.relation.ispartofdatefrom2008-11-30
dc.relation.ispartofdateto2008-12-04
dc.relation.ispartoflocationNew Orleans, LA
dc.relation.ispartofissue6
dc.relation.ispartofvolume3
dc.rights.retentionY
dc.subject.fieldofresearchOther information and computing sciences not elsewhere classified
dc.subject.fieldofresearchcode469999
dc.titleSubstantiating Security Threats Using Group Outlier Detection Techniques
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
gro.date.issued2008
gro.hasfulltextFull Text
gro.griffith.authorMuthukkumarasamy, Vallipuram


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record