{"title":"The case for collaborative distributed wireless intrusion detection systems","authors":"R. Beyah, C. Corbett, J. Copeland","doi":"10.1109/GRC.2006.1635917","DOIUrl":null,"url":null,"abstract":"Since their inception, wireless local area networks (WLANs) have made significant progress in terms of security. They initially suffered from weak authentication, weak encryption, weak message integrity, etc. These weaknesses prompted the formation of the 802.11i standard. The 802.11i standard is a very robust standard that fixes the known problems of its predecessor. This standard also represents a significant development in security; however, it does little to protect authorized users from other authorized users. In this paper, we discuss the evolution of security threats and we make the case for the need for collaborative distributed wireless intrusion detection systems. Further, we introduce the hotspot worm and show, using infectious epidemic models, a worst-case attack that can easily compromise a million users without using the Internet and without being detected.","PeriodicalId":400997,"journal":{"name":"2006 IEEE International Conference on Granular Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE International Conference on Granular Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GRC.2006.1635917","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Since their inception, wireless local area networks (WLANs) have made significant progress in terms of security. They initially suffered from weak authentication, weak encryption, weak message integrity, etc. These weaknesses prompted the formation of the 802.11i standard. The 802.11i standard is a very robust standard that fixes the known problems of its predecessor. This standard also represents a significant development in security; however, it does little to protect authorized users from other authorized users. In this paper, we discuss the evolution of security threats and we make the case for the need for collaborative distributed wireless intrusion detection systems. Further, we introduce the hotspot worm and show, using infectious epidemic models, a worst-case attack that can easily compromise a million users without using the Internet and without being detected.