A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks

Jaime Zuniga-Mejia, Rafaela Villalpando-Hernandez, Cesar Vargas-Rosales, Andreas Spanias

Research output: Contribution to journalArticle

Abstract

Reconfigurable wireless networks, such as ad hoc or wireless sensor networks, do not rely on fixed infrastructure. Nodes must cooperate in the multi-hop routing process. This dynamic and open nature make reconfigurable networks vulnerable to routing attacks that could degrade significantly network performance. Intrusion detection systems consist of a set of techniques designed to identify hostile behavior. In this paper, there are several approaches for intrusion detection in reconfigurable network routing such as collaborative, statistical, or machine learning-based techniques. In this paper, we introduce a new approach to intrusion detection for reconfigurable network routing based on linear systems theory. Using this approach, we can discriminate routing attacks by considering the system's z-plane poles. The z-plane can be thought of as a two dimensional feature space that arises naturally. It is independent of the number of network attack detection metrics and does not require extra dimensionality reduction. Two different host-based intrusion detection techniques, inspired by this new linear systems perspective, are presented and analyzed through a case study. The case study considers the effects of attack severity and node mobility to the attack detection performance. High attack detection accuracy was obtained without increasing packet overhead for both techniques by analyzing locally available information.

Original languageEnglish (US)
Article number8710247
Pages (from-to)60486-60500
Number of pages15
JournalIEEE Access
Volume7
DOIs
StatePublished - Jan 1 2019

Fingerprint

Intrusion detection
Linear systems
Wireless networks
Network routing
System theory
Network performance
Learning systems
Wireless sensor networks
Poles

Keywords

  • Ad hoc networks
  • intrusion detection
  • linear systems
  • network intrusion detection system
  • network security
  • reconfigurable networks

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Cite this

A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks. / Zuniga-Mejia, Jaime; Villalpando-Hernandez, Rafaela; Vargas-Rosales, Cesar; Spanias, Andreas.

In: IEEE Access, Vol. 7, 8710247, 01.01.2019, p. 60486-60500.

Research output: Contribution to journalArticle

Zuniga-Mejia, Jaime ; Villalpando-Hernandez, Rafaela ; Vargas-Rosales, Cesar ; Spanias, Andreas. / A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks. In: IEEE Access. 2019 ; Vol. 7. pp. 60486-60500.
@article{f682429cba864e6b9668c4c22296a695,
title = "A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks",
abstract = "Reconfigurable wireless networks, such as ad hoc or wireless sensor networks, do not rely on fixed infrastructure. Nodes must cooperate in the multi-hop routing process. This dynamic and open nature make reconfigurable networks vulnerable to routing attacks that could degrade significantly network performance. Intrusion detection systems consist of a set of techniques designed to identify hostile behavior. In this paper, there are several approaches for intrusion detection in reconfigurable network routing such as collaborative, statistical, or machine learning-based techniques. In this paper, we introduce a new approach to intrusion detection for reconfigurable network routing based on linear systems theory. Using this approach, we can discriminate routing attacks by considering the system's z-plane poles. The z-plane can be thought of as a two dimensional feature space that arises naturally. It is independent of the number of network attack detection metrics and does not require extra dimensionality reduction. Two different host-based intrusion detection techniques, inspired by this new linear systems perspective, are presented and analyzed through a case study. The case study considers the effects of attack severity and node mobility to the attack detection performance. High attack detection accuracy was obtained without increasing packet overhead for both techniques by analyzing locally available information.",
keywords = "Ad hoc networks, intrusion detection, linear systems, network intrusion detection system, network security, reconfigurable networks",
author = "Jaime Zuniga-Mejia and Rafaela Villalpando-Hernandez and Cesar Vargas-Rosales and Andreas Spanias",
year = "2019",
month = "1",
day = "1",
doi = "10.1109/ACCESS.2019.2915936",
language = "English (US)",
volume = "7",
pages = "60486--60500",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - JOUR

T1 - A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks

AU - Zuniga-Mejia, Jaime

AU - Villalpando-Hernandez, Rafaela

AU - Vargas-Rosales, Cesar

AU - Spanias, Andreas

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Reconfigurable wireless networks, such as ad hoc or wireless sensor networks, do not rely on fixed infrastructure. Nodes must cooperate in the multi-hop routing process. This dynamic and open nature make reconfigurable networks vulnerable to routing attacks that could degrade significantly network performance. Intrusion detection systems consist of a set of techniques designed to identify hostile behavior. In this paper, there are several approaches for intrusion detection in reconfigurable network routing such as collaborative, statistical, or machine learning-based techniques. In this paper, we introduce a new approach to intrusion detection for reconfigurable network routing based on linear systems theory. Using this approach, we can discriminate routing attacks by considering the system's z-plane poles. The z-plane can be thought of as a two dimensional feature space that arises naturally. It is independent of the number of network attack detection metrics and does not require extra dimensionality reduction. Two different host-based intrusion detection techniques, inspired by this new linear systems perspective, are presented and analyzed through a case study. The case study considers the effects of attack severity and node mobility to the attack detection performance. High attack detection accuracy was obtained without increasing packet overhead for both techniques by analyzing locally available information.

AB - Reconfigurable wireless networks, such as ad hoc or wireless sensor networks, do not rely on fixed infrastructure. Nodes must cooperate in the multi-hop routing process. This dynamic and open nature make reconfigurable networks vulnerable to routing attacks that could degrade significantly network performance. Intrusion detection systems consist of a set of techniques designed to identify hostile behavior. In this paper, there are several approaches for intrusion detection in reconfigurable network routing such as collaborative, statistical, or machine learning-based techniques. In this paper, we introduce a new approach to intrusion detection for reconfigurable network routing based on linear systems theory. Using this approach, we can discriminate routing attacks by considering the system's z-plane poles. The z-plane can be thought of as a two dimensional feature space that arises naturally. It is independent of the number of network attack detection metrics and does not require extra dimensionality reduction. Two different host-based intrusion detection techniques, inspired by this new linear systems perspective, are presented and analyzed through a case study. The case study considers the effects of attack severity and node mobility to the attack detection performance. High attack detection accuracy was obtained without increasing packet overhead for both techniques by analyzing locally available information.

KW - Ad hoc networks

KW - intrusion detection

KW - linear systems

KW - network intrusion detection system

KW - network security

KW - reconfigurable networks

UR - http://www.scopus.com/inward/record.url?scp=85065976887&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85065976887&partnerID=8YFLogxK

U2 - 10.1109/ACCESS.2019.2915936

DO - 10.1109/ACCESS.2019.2915936

M3 - Article

AN - SCOPUS:85065976887

VL - 7

SP - 60486

EP - 60500

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

M1 - 8710247

ER -