Show simple item record

dc.contributor.authorSithirasenan, E
dc.contributor.authorMuthukkumarasamy, V
dc.contributor.editorNiki Pissinou
dc.date.accessioned2017-05-03T13:58:44Z
dc.date.available2017-05-03T13:58:44Z
dc.date.issued2008
dc.date.modified2009-12-03T06:05:55Z
dc.identifier.issn1796-2056
dc.identifier.doi10.4304/jnw.3.8.2-15
dc.identifier.urihttp://hdl.handle.net/10072/23506
dc.description.abstractWith the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. Nevertheless, fresh security threats are emerging often to oust these new defense mechanisms. Further, many organizations based on superficial vendor literature, believe their wireless security is sufficient enough to prevent any unauthorized access. Having wide ranging options for security configurations, users are camouflaged into deep uncertainty. This volatile state of affairs has prevented many organizations from fully deploying WLANs for their secure communication needs, though WLANs may be cost effective and flexible. In this paper, we present a novel mechanism to detect and substantiate anomalies caused by both known and unknown security threats in WLANs. We monitor the wireless environment for timing and/or behavior anomalies during the security association process and use outlier based data association approaches to substantiate their legitimacy. The proposed concept was tested on our experimental setup. The results obtained from wireless hosts configured for EAP-LEAP, PEAP and TLS security association show high confidence for EAP group events.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent232888 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherAcademy Publisher
dc.publisher.placeOulu, Finland
dc.publisher.urihttp://www.academypublisher.com/ojs/
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofpagefrom2
dc.relation.ispartofpageto15
dc.relation.ispartofissue8
dc.relation.ispartofjournalJournal of Networks
dc.relation.ispartofvolume3
dc.rights.retentionY
dc.subject.fieldofresearchOther information and computing sciences not elsewhere classified
dc.subject.fieldofresearchcode469999
dc.titleSubstantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
dc.typeJournal article
dc.type.descriptionC1 - Articles
dc.type.codeC - Journal Articles
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2008 Academy Publisher. The attached file is reproduced here in accordance with the copyright policy of the publisher. Please refer to the journal's website for access to the definitive, published version.
gro.date.issued2008
gro.hasfulltextFull Text
gro.griffith.authorMuthukkumarasamy, Vallipuram


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record