论文标题
RIDS:启用WPA3的实时入侵检测系统
RIDS : Real-time Intrusion Detection System for WPA3 enabled Enterprise Networks
论文作者
论文摘要
随着新IEEE 802.11AX(WIFI 6)设备的出现,启用安全性是优先事项。由于发现以前的版本具有安全性漏洞,可以修复最常见的安全缺陷,因此引入了WiFi受保护的访问3(WPA3)。尽管WPA3在安全方面是对其前身的改进,但最近发现WPA3也具有一些安全漏洞。在本文中,我们提到了WPA3和WPA2中先前已知的漏洞。除此之外,我们还基于WPA3攻击(第三节)创建了自己的数据集。我们提出了一个两阶段的解决方案,用于检测网络中的入侵。两阶段的方法将有助于缓解AP和WLAN控制器的计算处理负担。首先,AP将在一定时间间隔内执行轻巧的简单操作(例如500ms)。在发现流量流的任何异常后,控制器基于ML的解决方案将检测到攻击的类型。我们的方法是利用AP上的资源以及具有一定优化水平的后端控制器。使用基于ML的解决方案,我们在攻击检测中已达到超过99%的精度。我们还为开源研究界公开提供了我们的代码和数据集,以便为未来的研究工作做出贡献。
With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security is a priority. Since previous versions were found to have security vulnerabilities, to fix the most common security flaws, the WiFi Protected Access 3 (WPA3) got introduced. Although WPA3 is an improvement over its predecessor in terms of security, recently it was found that WPA3 has a few security vulnerabilities as well. In this paper, we have mentioned the previously known vulnerabilities in WPA3 and WPA2. In addition to that, we have created our own dataset based on WPA3 attacks (Section III). We have proposed a two-stage solution for the detection of an intrusion in the network. The two-stage approach will help ease computational processing burden of an AP and WLAN Controller. First, AP will perform a lightweight simple operation for some duration (say 500ms) at certain time interval. Upon discovering any abnormality in the flow of traffic an ML-based solution at the controller will detect the type of attack. Our approach is to utilize resources on AP as well as the back-end controller with certain level of optimization. We have achieved over 99% accuracy in attack detection using an ML-based solution. We have also publicly provided our code and dataset for the open-source research community, so that it can contribute for future research work.