Telecommunications Science ›› 2013, Vol. 29 ›› Issue (11): 38-44.doi: 10.3969/j.issn.1000-0801.2013.11.007

• research and development • Previous Articles     Next Articles

Research on Distributed Wireless Multi-Step Attack Pattern Mining Method for WLAN

Guanlin Chen1,2,Zebing Wang1,Yong Zhang1   

  1. 1 School of Computer and Computing Science, Zhejiang University City College, Hangzhou 310015, China
    2 College of Computer Science, Zhejiang University, Hangzhou 310027, China
  • Online:2013-11-20 Published:2017-07-04

Abstract:

As the important means of network security, intrusion detection and prevention technology have seen some preliminary applications in the traditional wired network environment. Due to the distinctive characteristics of wireless network, the applications of multi-stage attack plan recognition for WLAN are rarely seen in spite of the promising potential. A distributed wireless multi-step attack pattern mining(DWMAPM)method based on correlation analysis with the IEEE 802.11 protocol frame attributes was proposed. The method consists of five steps:constructing a global attack database, building candidate attack chains, filtering candidate attack chains, correlating multi-step attack behaviors and recognizing multi-step attack patterns. Experimental results show that DWMAPM is effective for recognizing a variety of typical attack patterns in real WLAN attack scenarios, and can provide a basis for forecasting the final attack plans.

Key words: multi-step attack pattern, WLAN, plan recognition, correlation analysis, network security

No Suggested Reading articles found!