WLANs. (Prasad, 2007) proposes a threat
identification methodology applied to a Personal
Network (PN), however the approach relies on the
user having expert knowledge and assumes that all
vulnerabilities will be identified through
brainstorming.
Another framework taking a similar approach is
(Hernan et al, 2007). The procedure takes
structurally similar steps but arrives at a table
(Microsoft SDL Blog, 2007) which works more as a
guide to a set of bins in which to store brainstorming
ideas. It is also primarily for software development
rather than at a network infrastructure level.
Future work will seek to enhance the T-V table
to include additional factors such as bandwidth,
latency, routing devices, network elements etc.
6 CONCLUSIONS
At present there is no coherent means of
representing the detection performance of IDS
systems for wireless area networks (Ibrahim, et al.,
2008), making selection of IDS for these networks a
problem. This paper presents a novel evaluation
framework which provides the capability to evaluate
and compare the attack detection of a range of
network topographies. Such performance evaluation
tools will aid the proliferation of IDS as well as help
evaluate network threats.
It is demonstrated that there is a difference in
attributes for network topographies even within
infrastructure environments. This difference exists in
resource usage and security, two important tenets of
an Intrusion Detection System. This highlights the
requirement that future IDS research and security
tactics need to adapt to network deployment
strategies in both a technology and logistics sense
(e.g. resources, equipment, users).
Both issues are addressed by the development of
a novel Threat-Victim (T-V) Detection Table
framework which provides rapid, visual detection
performance evaluation and comparison of relative
IDS performance. A number of typical WLAN
topographies are explored using a well-known open
source IDS (Kismet). Kismet’s modularity is useful
in research scenarios and utilising this it is shown
that any WIDS needs to be tailored according to the
topography of the network deployment. The T-V
tables can also be used to allow network security
designers to choose the most appropriate IDS for
their network depending on its detection features,
their own prioritisation and on the topography of the
network.
REFERENCES
BBC Watchdog, 2009. Is your Wifi Secure? BBC Online,
[online] 29 October. Available at http://
www.bbc.co.uk/blogs/watchdog/2009/10/wifi_hot_spo
ts_not_secure.html [accessed 30 October 2009]
Crainicu, B., 2008. Wireless LAN Security Mechanisms at
the Enterprise and Home Level. Novel Algorithms and
Techniques in Telecommunications, Automation and
Industrial Electronics, pp. 306-310
Gill, R., et al, 2006. Specification-Based Intrusion
Detection in WLANs. 22
nd
Annual Computer Security
Applications Conference (ACSAC’06).
Hernan, S et al, 2007. Uncover Security Design Flaws
Using The STRIDE Approach[online]. Available at
http://msdn.microsoft.com/en/gb/magazine/cc163519.
aspx
Ibrahim, T., et al, 2008. Assessing the challenges of
Intrusion Detection Systems,Available at: http://
www.intrusiononline.net/ docs/cisnrAC_IDS.pdf
[Accessed 15 November 2009]
Kershaw, M., 2010. Kismet [online]. Available at: http://
www.kismetwireless.net/
Microsoft SDL Blog. 2007. STRIDE Chart. [online].
Available at http://blogs.msdn.com/sdl/archive/
2007/09/11/ stride-chart.aspx
Microsoft Windows Help. 2007. Choosing a Network
Location. [online]. Available at http://windows.
microsoft.com/en-us/windows-vista/Choosing-a-
network-location
Ref, 2009. Removed
Mirkovic, J., Reiher, P., 2004. A Taxonomy of DDoS
Attack and DDoS Defence Mechanisms. ACM
SIGCOMM Computer Communication Review (34/2)
pp.39-53
Prasad, N. R., 2007. Threat Model Framework and
Methodology for Personal Networks (PNs). In
Communication Systems Software and Middleware,
2007 (COMSWARE 2007).
Snort IDS, 2010. [online] Available at: http://
www.snort.org/
Thamilarasu, G., Sridhar, R., 2007. Exploring Cross-layer
techniques for Security: Challenges and Opportunities
in Wireless Networks. In MILCOM 2007.
Turab, N., Moldoveanu, F., 2009. A Comparison Between
Wireless LAN Security Protocols. [online] University
Politehnica of Bucharest. Available at: http://www.
scientificbulletin.upb.ro/rev_docs/arhiva/full7970.pdf
SECRYPT 2010 - International Conference on Security and Cryptography
42