By Topic

A quantitative approach towards detection of an optimal attack path in a wireless network using modified PSO technique

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ghosh, N. ; Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur ; Nanda, S. ; Ghosh, S.K.

In recent years there has been an immense proliferation of wireless networks and they are becoming increasingly vulnerable to attacks. Thus there is a serious need to secure such networks from attacks. Usually an attacker can penetrate into a network by utilizing a chain of exploits. An exploit is a small piece of code that makes use of vulnerabilities present in a service or in a system. Each exploit in the chain has a set of preconditions and effects and lays the groundwork for the subsequent exploits. Application of such a chain of exploits generates a set of attack states or network states which form a path called the attack path and combining many such attack paths produces an attack graph. A lot of research has been done on issues such as scalable and time efficient ways of generation of attack graphs in wired network in contrast to that in wireless scenario. Moreover, the need is to identify the path that may be chosen by the attacker to comprise a target system in less time and effort. The proposed methodology in this paper aims as finding out the optimal or risk-prone attack path that the attacker may choose to penetrate a wireless network. The generation of attack paths in a wireless network is itself a difficult proposition due to networks inherent dynamic nature and ever changing topology. In this work, the Particle Swarm Optimization (PSO) technique has been employed for finding out the optimal attack path using an attack vector metric. The effort required on the part of the attacker to compromise a target system has been termed as an attack vector. The wireless nodes have been assigned severity measures obtained from customized risk parameters which serve as an input to the modified PSO technique. A case study has also been presented to demonstrate the efficacy of the proposed methodology.

Published in:

Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First International

Date of Conference:

5-10 Jan. 2009