Abstract
This paper applies Fuzzy Logic in Destination Traffic Fingerprint Method, to the process of establishing if the traffic to a specific IP destination is constant. In order to obtain strong fingerprints, it is absolutely necessary to distinguish between constant traffic and non-constant traffic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sasu, E.C., Prostean, O.: Using Constant Traffic to Specific IP Destinations for Detecting Spoofed MAC Addresses in Local Area Networks. In: IEEE International Joint Conferences on Computational Cybernetics and Technical Informatics, Timisoara, Romania, pp. 677–681 (2010)
Sasu, E.C., Prostean, O.: Testing DTF Method for Applicability in a Real Environment. In: 7th IEEE International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, pp. 285–289 (2012)
Wang, H., Jin, C., Shin, K.G.: Defense Against Spoofed IP Traffic Using Hop-Count Filtering. IEEE/ACM Transactions on Networking 15(1), 40–53 (2006)
Sheng, Y., Tan, K., Chen, G., Kotz, D., Campbell, A.: Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. In: IEEE INFOCOM 2008 Proceedings, Phoenix, USA, pp. 2441–2449 (2008)
Chandrasekaran, G., Francisco, J., Ganapathy, V., Gruteser, M., Trappe, W.: Detecting Identity Spoofs in IEEE 802.11e Wireless Networks. In: IEEE GLOBECOM 2009 Proceedings, Honolulu, Hawaii, USA (2009)
Goel, S., Kumar, S.: An Improved Method of Detecting Spoofed Attack in Wireless LAN. In: First International Conference on Networks & Communications, Chennai, India, pp. 104–108 (2009)
Martinez, A., Zurutuza, U., Uribeetxeberria, R., Fernandez, M., Iizarraga, J., Serna, A., Velez, I.: Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. In: The Third International Conference on Availability, Reliability and Security, Barcelona, Spain, pp. 520–525 (2008)
Huang, H., Chang, K., Lu, Y., Yang, C.: Countermeasures against MAC Address Spoofing in Public Wireless Networks using Lightweight Agents. In: 5th International ICST Conference on Wireless Internet, Singapore, China (2010)
Bansal, R., Tiwari, S., Bansal, D.: Non-Cryptographic Methods of MAC Spoof Detection in Wireless LAN. In: 6th International Conference on Natural Language Processing, Pune, India (2008)
Chumchu, P., Saelim, T.: A New MAC Address Spoofing Detection Algorithm using PLCP Header. In: The International Conference on Information Networking 2011, Kuala Lumpur, Malaysia, pp. 48–53 (2010)
Zadeh, L.A.: Fuzzy Sets. Information and Control 8(3), 338–353 (1965)
Zadeh, L.A.: The role of Fuzzylogic in modeling, identification and control. Modeling, Identification and Control 15(3), 191–203 (1994)
MathWorks, Fuzzy Logic Toolbox, http://www.mathworks.com/products/fuzzy-logic/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sasu, E.C., Prostean, O. (2013). Using Fuzzy Logic to Determine If the Traffic Is Constant or Not in DTF Method. In: Balas, V., Fodor, J., Várkonyi-Kóczy, A., Dombi, J., Jain, L. (eds) Soft Computing Applications. Advances in Intelligent Systems and Computing, vol 195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33941-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-33941-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33940-0
Online ISBN: 978-3-642-33941-7
eBook Packages: EngineeringEngineering (R0)