IEEE/CAA Journal of Automatica Sinica
Citation: | Mayank Agarwal, Sanketh Purwar, Santosh Biswas and Sukumar Nandi, "Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks Using Real Time Discrete Event System," IEEE/CAA J. Autom. Sinica, vol. 4, no. 4, pp. 792-808, Oct. 2017. doi: 10.1109/JAS.2016.7510178 |
[1] |
Aircrack-ng Suite. [Online]. Available: http://www.aircrack-ng.org/.
|
[2] |
Scapy-A powerful interactive packet manipulation program. [Online]. Available: http://www.secdev.org/projects/scapy/
|
[3] |
J. Bellardo and S. Savage, "802. 11 denial-of-service attacks: Real vulnerabilities and practical solutions, " in Proc. 12th Conf. USENIX Security Symposium, Berkeley, CA, USA, 2003. http://portal.acm.org/citation.cfm?id=1251353.1251355
|
[4] |
"Information technology-telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, " IEEE Std 802. 11-2007, pp. C1-1184, 2017.
|
[5] |
R. Bansal, S. Tiwari, and D. Bansal, "Non-cryptographic methods of MAC spoof detection in wireless LAN, " in Proc. 16th IEEE International Conf. Networks, New Delhi, India, 2008, pp. 1-6. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4772621
|
[6] |
P. García-Teodoro, J. Díaz-Verdejo, G. Mácia-Fernández, and E. Vázquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges, " Comput. Secur. , vol. 28, no. 1-2, pp. 18-28, Feb. 2009. http://dl.acm.org/citation.cfm?id=2639726
|
[7] |
S. Gayaka and B. Yao, "Fault detection, identification and accommodation for an electro-hydraulic system: An adaptive robust APproach, " IFAC Proc. Vol. , vol. 41, no. 2, pp. 13815-13820, Jul. 2008. doi: 10.3182/20080706-5-KR-1001.02339
|
[8] |
A. Alaghi, N. Karimi, M. Sedghi, and Z. Navabi, "Online NoC switch fault detection and diagnosis using a high level fault model, " in Proc. 22nd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems, DFT Ó7. , Rome, Italy, 2007, pp. 21-29. http://dl.acm.org/citation.cfm?id=1302720
|
[9] |
L. F. Gonçalves, J. L. Bosa, T. R. Balen, M. S. Lubaszewski, E. L. Schneider, and R. V. Henriques, "Fault detection, diagnosis and prediction in electrical valves using self-organizing maps, " J. Electron. Test. , vol. 27, no. 4, pp. 551-564, Apr. 2011. doi: 10.1007/s10836-011-5220-0
|
[10] |
S. Hong and S. Kim, "Lizard: Energy-efficient hard fault detection, diagnosis and isolation in the ALU, " in Proc. IEEE International Conf. Computer Design (ICCD), Amsterdam, the Netherlands, 2010, pp. 342-349.
|
[11] |
X. Yu and J. Jiang, "Hybrid fault-tolerant flight control system design against partial actuator failures, " IEEE Trans. Control Syst. Technol. , vol. 20, no. 4, pp. 871-886, Jul. 2012. http://ieeexplore.ieee.org/document/5966371/
|
[12] |
C. F. Chien, C. Y. Hsu, and P. N. Chen, "Semiconductor fault detection and classification for yield enhancement and manufacturing intelligence, " Flex. Serv. Manuf. J. , vol. 25, no. 3, pp. 367-388, Sep. 2013. doi: 10.1007/s10696-012-9161-4
|
[13] |
S. J. Youk, S. S. Yoo, C. Y. Lee, J. H. Kho, and G. Lee, "Development of fault detection system in air handling unit, " in Proc. International Conf. Convergence and Hybrid Information Technology, Daejeon, Korea, 2008, pp. 287-292. http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=4622840
|
[14] |
S. Lafortune, "Diagnosis of discrete event systems, " in Encyclopedia of Systems and Control. London, UK: Springer, 2014, pp. 1-10.
|
[15] |
J. Zaytoon and S. Lafortune, "Overview of fault diagnosis methods for discrete event systems, " Ann. Rev. Control, vol. 37, no. 2, pp. 308-320, Dec. 2013. http://www.sciencedirect.com/science/article/pii/S1367578813000552
|
[16] |
C. Mahulea, C. Seatzu, M. P. Cabasino, and M. Silva, "Fault diagnosis of discrete-event systems using continuous petri nets, " IEEE Trans. Syst. , Man Cyber. A: Syst. Hum. , vol. 42, no. 4, pp. 970-984, Jul. 2012. http://ieeexplore.ieee.org/document/6153391/
|
[17] |
M. P. Fanti, A. M. Mangini, and W. Ukovich, "Fault detection by labeled petri nets in centralized and distributed APproaches, " IEEE Trans. Automat. Sci. Eng. , vol. 10, no. 2, pp. 392-404, Apr. 2013. http://ieeexplore.ieee.org/document/6236236/
|
[18] |
M. Chang, W. Dong, Y. D. Ji, and L. Tong, "On fault predictability in stochastic discrete event systems, " Asian J. Control, vol. 15, no. 5, pp. 1458-1467, Sep. 2013. doi: 10.1002/asjc.748/full
|
[19] |
R. H. Kwong and D. L. Yonge-Mallo, "Fault diagnosis in discrete-event systems: Incomplete models and learning, " IEEE Trans. Syst. Man Cyber. B: Cyber. , vol. 41, no. 1, pp. 118-130, Feb. 2011. http://ieeexplore.ieee.org/document/5462887/
|
[20] |
P. Bhowal, D. Sarkar, S. Mukhopadhyay, and A. Basu, "Fault diagnosis in discrete time hybrid systems-a case study, " Inf. Sci. , vol. 177, no. 5, pp. 1290-1308, Mar. 2007. http://www.sciencedirect.com/science/article/pii/S0020025506002386
|
[21] |
N. Hubballi, S. Biswas, S. Roopa, R. Ratti, and S. Nandi, "LAN attack detection using discrete event systems, " ISA Trans. , vol. 50, no. 1, pp. 119-130, Jan. 2011. http://www.ncbi.nlm.nih.gov/pubmed/20804980
|
[22] |
C. G. Cassandras and S. Lafortune, Introduction to Discrete Event Systems. Secaucus, NJ, USA:Springer-Verlag New York, Inc., 2006.
|
[23] |
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, "A fast automatonbased method for detecting anomalous program behaviors, " in Proc. 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2001, pp. 144-155. http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=924295
|
[24] |
S. Whittaker, M. Zulkernine, and K. Rudie, "Towards incorporating discrete-event systems in secure software development, " in Proc. Third International Conf. Availability, Reliability and Security, 2008. ARES 08. , Barcelona, Spain, 2008, pp. 1188-1195. http://ieeexplore.ieee.org/document/4529478/
|
[25] |
Z. I. Qureshi, B. Aslam, A. Mohsin, and Y. Javed, "A solution to spoofed PS-poll based denial of service attacks in IEEE 802. 11 WLANs, " in Proc. 11th Conf. 11th WSEAS International Conf. Communications, vol. 11, pp. 7-11, Jul. 2007. http://dl.acm.org/citation.cfm?id=1348103
|
[26] |
L. F. Meiners, "But. . . my station is awake! (Power Save Denial of Service in 802. 11 Networks), "[Online]. Available: http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=publication&name=WiFiPowerSaveDoS.
|
[27] |
W. J. Gu, Z. M. Yang, D. Xuan, W. J. Jia, and C. Que, "Null data frame: A double-edged sword in IEEE 802. 11 WLANs, " IEEE Trans. Parallel Distrib. Syst. , vol. 21, no. 7, pp. 897-910, Jul. 2010. http://dl.acm.org/citation.cfm?id=1830083
|
[28] |
D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints, " in Proc. 5th ACM Workshop on Wireless Security, New York, NY, USA, 2006, pp. 43-52. http://dl.acm.org/citation.cfm?id=1161298
|
[29] |
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks, " in Proc. 14th ACM Conf. Computer and Communications Security, Alexandria, Virginia, USA, 2007, pp. 401-410. http://dl.acm.org/citation.cfm?id=1315295
|
[30] |
Y. Y. Chen, W. Trappe, and R. P. Martin, "Detecting and localizing wireless spoofing attacks, " in Proc. 4th Annual IEEE Communications Society Conf. Sensor, Mesh and Ad Hoc Communications and Networks, 2007. SECONÓ7. , San Diego, CA, USA, 2007, pp. 193-202.
|
[31] |
J. Wright, "How 802. 11w will improve wireless security, "[Online]. Available: http://www.networkworld.com/article/2312251/networksecurity/how-802-11w-will-improve-wireless-security.html. Accessed on: May 2006.
|
[32] |
CWNP, "Wireless LAN security and IEEE 802. 11w. "[Online]. Available: http://www.cwnp.com/cwnpwifiblog/wireless-lan-securityand-ieee-802-11w/.
|
[33] |
S. Biswas, D. Sarkar, and S. Mukhopadhyay, "Diagnosability of delaydeadline failures in fair real time discrete event models, " Int. J. Syst. Sci. , vol. 41, no. 7, pp. 763-782, Jul. 2010. http://dl.acm.org/citation.cfm?id=1832904.1832908
|
[34] |
M. Sampath, R. Sengupta, S. Lafortune, K. Sinnamohideen, and D. Teneketzis, "Diagnosability of discrete-event systems, " IEEE Trans. Automat. Control, vol. 40, no. 9, pp. 1555-1575, Sep. 1995.
|
[35] |
"BackTrack. "[Online]. Available: http://www.backtrack-linux.org/.
|
[36] |
N. J. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. A. Olsson, "A methodology for testing intrusion detection systems, " IEEE Trans. Softw. Eng. , vol. 22, no. 10, pp. 719-729, Oct. 1996. http://www.emeraldinsight.com/servlet/linkout?suffix=B11&dbid=16&doi=10.1108%2FEUM0000000005807&key=10.1109%2F32.544350
|