Abstract
WiFi is the de-facto wireless standard which suffers from a significant security vulnerability. Indeed, the WiFi management frames are not sent via an encrypted channel. However, many studies have been conducted to face this issue, but, preparing a comprehensive model for assessing the performance of these systems under different conditions is a research gap. In this paper, we propose an Abstract WIDPS with a useful but straightforward response function in confronting management frames transferring in an insecure channel. Indeed, we model the interaction between the entities involved in the problem based on game theory and propose a performance evaluation method for WIDPS depending on the network application context and the importance of confidentiality, integrity, and availability as the three principles of information security. This model provides an innovative solution for WIDPS qualitative classification. Finally, we evaluate the proposed method in several different samples, which obtains efficient results for classification and tuning of WIDPSs.
Similar content being viewed by others
References
Cisco visual networking index. Forecast and methodology, 20162021—cisco. https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html. Accessed 19 Oct 2018.
I.C.S.L.M.S. Committee, et al., ANSI/IEEE Std. 802.11-1999, 1999.
T.D. Nguyen, D.H. Nguyen, B.N. Tran, H. Vu, and N. Mittal, In: 2008 Proceedings of 17th international conference on computer Communications and networks IEEE, New York, pp. 1–6, 2008.
H. Han, B. Sheng, C. C. Tan, Q. Li and S. Lu, A timing-based scheme for rogue AP detection, IEEE Transactions on parallel and distributed Systems, Vol. 22, No. 11, p. 1912, 2011.
R. Mitchell and R. Chen, A survey of intrusion detection in wireless network applications, Computer Communications, Vol. 42, p. 1, 2014.
K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), NIST Special Publication, Vol. 800, No. 2007, p. 94, 2007.
R. Myerson, Game Theory. Harvard University Press, Cambridge, 2013. https://books.google.com/books?id=oGUET9JBytEC.
Y. Narahari, Game Theory and Mechanism Design4 ed., World ScientificSingapore, 2014.
S. Tadelis, Game Theory: An Introduction, Princeton University PressPrinceton, 2013.
K. Leyton-Brown, and Y. Shoham, Essentials of Game Theory: A Concise, Multidisciplinary Introduction. Synthesis lectures on artificial intelligence and machine learning. Morgan & Claypool Publishers, 2008. https://books.google.com/books?id=u8sDLATVJikC.
B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 221–226, 2006.
B. Aslam, M.H. Islam, and S.A. Khan, In Proceedings of the First Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. IEEE, New York, pp. 215–220, 2006.
K. Bicakci and B. Tavli, Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks, Computer Standards & Interfaces, Vol. 31, No. 5, p. 931, 2009.
M. Malekzadeh, A. A. A. Ghani, J. Desa and S. Subramaniam, An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks, IJCSNS, Vol. 8, No. 8, p. 1, 2008.
M. Bernaschi, F. Ferreri and L. Valcamonici, Access points vulnerabilities to DoS attacks in 802.11 networks, Wireless Networks, Vol. 14, No. 2, p. 159, 2008.
H. Hwang, G. Jung, K. Sohn, and S. Park, In International Conference on Information Science and Security, 2008. ICISS. IEEE, New York, pp. 164–170, 2008.
K. Bauer, H. Gonzales, and D. McCoy, In IEEE International Performance, computing and communications conference, 2008. IPCCC 2008. IEEE, New York, pp. 513–516, 2008.
S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, In Proceedings of the first ACM conference on Wireless network security. ACM, New York, pp. 56–61, 2008.
G. Chen, H. Yao, and Z. Wang, In Second International Conference on Future Networks, 2010. ICFN’10. IEEE, New York, pp. 168–172, 2010.
C. Yang, Y. Song and G. Gu, Active user-side evil twin access point detection using statistical techniques, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 5, p. 1638, 2012.
S. Y. Rashida, Hybrid architecture for distributed intrusion detection system in wireless network, International Journal of Network Security & Its Applications, Vol. 5, No. 3, p. 45, 2013.
N. Sharma, P. N. Barwal and C. Noida, Study of DoS Attacks on IEEE 802. 11 WLAN and its prevention/detection techniques, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 3, No. 3, p. 245, 2014.
P. Kavitha and M. Usha, Anomaly based intrusion detection in wlan using discrimination Algorithm combined with Naive Bayesian Classifier Naive Bayesian Classifier, Journal of Theoretical & Applied Information Technology, Vol. 62, p. 1, 2014.
S. M. Moosavirad, P. Kabiri and H. Mahini, Rashnu: a Wi-Fi intrusion response scheme, Security and Communication Networks, Vol. 8, No. 12, p. 2070, 2015.
N. Baharudin, F.H.M. Ali, M.Y. Darus, and N. Awang, In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, New York, pp. 1–5, 2015.
C. Kolias, G. Kambourakis, A. Stavrou and S. Gritzalis, Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset, IEEE Communications Surveys & Tutorials, Vol. 18, No. 1, p. 184, 2016.
A. Kumar, P. Paul, In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT). IEEE, New York, pp. 176–181, 2016.
M.A.C. Aung, and K.P. Thant, In 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, New York, pp. 173–178, 2017.
J. Kaur, Networking Communication and Data Knowledge Engineering, SpringerBerlin, 2018. pp. 15–24.
J.F.M. Sánchez, O.J.S. Parra, and A.A. López, In International Conference on Future Data and Security Engineering. Springer, Berlin, pp. 66–73, 2018.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mahini, H., Mousavirad, S.M. WiFi Intrusion Detection and Prevention Systems Analyzing: A Game Theoretical Perspective. Int J Wireless Inf Networks 27, 77–88 (2020). https://doi.org/10.1007/s10776-019-00474-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10776-019-00474-3