Reference Hub2
Intrusion and Anomaly Detection in Wireless Networks

Intrusion and Anomaly Detection in Wireless Networks

Amel Meddeb Makhlouf, Noureddine Boudriga
Copyright: © 2008 |Pages: 17
ISBN13: 9781599048994|ISBN10: 159904899X|EISBN13: 9781599049007
DOI: 10.4018/978-1-59904-899-4.ch006
Cite Chapter Cite Chapter

MLA

Makhlouf, Amel Meddeb, and Noureddine Boudriga. "Intrusion and Anomaly Detection in Wireless Networks." Handbook of Research on Wireless Security, edited by Yan Zhang, et al., IGI Global, 2008, pp. 78-94. https://doi.org/10.4018/978-1-59904-899-4.ch006

APA

Makhlouf, A. M. & Boudriga, N. (2008). Intrusion and Anomaly Detection in Wireless Networks. In Y. Zhang, J. Zheng, & M. Ma (Eds.), Handbook of Research on Wireless Security (pp. 78-94). IGI Global. https://doi.org/10.4018/978-1-59904-899-4.ch006

Chicago

Makhlouf, Amel Meddeb, and Noureddine Boudriga. "Intrusion and Anomaly Detection in Wireless Networks." In Handbook of Research on Wireless Security, edited by Yan Zhang, Jun Zheng, and Miao Ma, 78-94. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-899-4.ch006

Export Reference

Mendeley
Favorite

Abstract

The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless vulnerabilities. Because of the radio links and the mobile equipment features of wireless networks, wireless intrusions are more complex because they add to the intrusions developed for wired networks, a large spectrum of complex attacks targeting wireless environment. These intrusions include rogue or unauthorized access point (AP), AP MAC spoofing, and wireless denial of service and require adding new techniques and mechanisms to those approaches detecting intrusions targeting wired networks. To face this challenge, some researchers focused on extending the deployed approaches for wired networks while others worked to develop techniques suitable for detecting wireless intrusions. The efforts have mainly addressed: (1) the development of theories to allow reasoning about detection, wireless cooperation, and response to incidents; and (2) the development of wireless intrusion and anomaly detection systems that incorporate wireless detection, preventive mechanisms and tolerance functions. This chapter aims at discussing the major theories, models, and mechanisms developed for the protection of wireless networks/systems against threats, intrusions, and anomalous behaviors. The objectives of this chapter are to: (1) discuss security problems in a wireless environment; (2) present the current research activities; (3) study the important results already developed by researchers; and (4) discuss the validation methods proposed for the protection of wireless networks against attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.