Weigh-in-Motion: Lightweight Real-Time Identification of Gbps Wireless Traffic
Abstract
:1. Introduction
- (1)
- Introduction of a new packet-level feature easily measurable at middleboxes for run-time packet classification of Gigabit speed wireless traffics (see Section 4).
- (2)
- Development of a lightweight run-time traffic classification algorithm using the sequential hypothesis testing (see Section 5).
- (3)
- Verification of the proposed algorithm through extensive real-world experiments and prototype implementation (see Section 6).
2. Background
2.1. Related Work
2.2. Frame Aggregation in High-Speed IEEE 802.11 Standards
3. Problem Description
3.1. Problem Statement
3.2. Limitation of Previous Approaches
4. A New Lightweight Feature
4.1. Observation
4.2. ACKBunch: A New Lightweight Network Statistic
4.3. Distribution of ACKBunch Size
5. Weigh-in-Motion: Online Detection Strategy
5.1. Criterion for Identifying Gbps Wi-Fi Traffic
5.2. Online Algorithm with Sequential Hypothesis Test
Algorithm 1 Weigh-In-Motion: Online Sequential Hypothesis Test for TCP-ACK flow m |
procedure Initialize()
procedure OnReceiveTCPAck()
procedure TestSPRT(n, l)
|
6. Performance Evaluation
6.1. Experiment Setup
6.2. Evaluation Results
7. Discussions
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
A-MPDU | aggregate medium access control (MAC) protocol data unit |
AP | Access Point |
CDF | cumulative distribution function |
DCF | Distributed Coordination Function |
IAT | Inter-packet arrival time |
IDS | Intrusion detection system |
IFS | inter frame space |
MAC | Medium access control |
MPDU | MAC-level protocol data unit |
PPDU | Physcial-layer protocol data unit |
RTT | Round Trip Time |
WLAN | Wireless LAN |
ACK Bunch for TCP flow m | |
length of ACKBunch |
Appendix A
Algorithm A1Weigh-In-Motion: Online Sequential Hypothesis Test for TCP-ACK flow m (Modification) |
procedureInitialize()
procedureOnReceiveTCPAck()
|
References
- Boeckl, K.; Grayson, N.; Howell, G.; Lefkovitz, N.; Ajmo, J.; McGinnis, M.; Sandlin, K.; Slivina, O.; Snyder, J.; Ward, P. Mobile Device Security: Bring Your Own Device (BYOD); Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021.
- Choi, J. Detection of Misconfigured BYOD Devices in Wi-Fi Networks. Appl. Sci. 2020, 10, 7203. [Google Scholar] [CrossRef]
- Bitglass. 2021 BYOD Security Report. Used 31 August 2021. Available online: https://pages.bitglass.com/CD-FY21Q2-BYOD2021_LP.html (accessed on 15 June 2021).
- Pu, Q.; Ng, J.K.Y.; Zhou, M.; Wang, J. A Joint Rogue Access Point Localization and Outlier Detection Scheme Leveraging Sparse Recovery Technique. IEEE Trans. Veh. Technol. 2021, 70, 1866–1877. [Google Scholar] [CrossRef]
- Pu, Q.; Ng, J.K.Y.; Deng, S.; Zhang, F. Rogue Access Point Localization Leveraging Compressive Sensing via Kernel Optimization. In Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea, 25–28 May 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Wei, W.; Jaiswal, S.; Kurose, J.; Towsley, D.; Suh, K.; Wang, B. Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference. IEEE/ACM Trans. Netw. 2012, 20, 325–338. [Google Scholar] [CrossRef] [Green Version]
- Han, H.; Sheng, B.; Tan, C.C.; Li, Q.; Lu, S. A Timing-Based Scheme for Rogue AP Detection. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 1912–1925. [Google Scholar] [CrossRef]
- IEEE Standards 802.11ac-2013; Enhancements for Very High Throughput for Operation in Bands below 6 GHz. IEEE Standards Association: Piscataway, NJ, USA, 2013; pp. 1–425. [CrossRef]
- IEEE Standards 802.11ax-2021; (Amendment to IEEE Std 802.11-2020): Enhancements for High-Efficiency WLAN. IEEE Standards Association: Piscataway, NJ, USA, 2021; pp. 1–767.
- Venkataraman, A.; Beyah, R. Rogue access point detection using innate characteristics of the 802.11 mac. In International Conference on Security and Privacy in Communication Systems; Springer: Berlin/Heidelberg, Germany, 2009; pp. 394–416. [Google Scholar]
- Amaral, P.; Dinis, J.; Pinto, P.; Bernardo, L.; Tavares, J.; Mamede, H.S. Machine learning in software defined networks: Data collection and traffic classification. In Proceedings of the 2016 IEEE 24th International Conference on Network Protocols (ICNP), Singapore, 8–11 November 2016; pp. 1–5. [Google Scholar]
- Fan, Z.; Liu, R. Investigation of machine learning based network traffic classification. In Proceedings of the 2017 International Symposium on Wireless Communication Systems (ISWCS), Bologna, Italy, 28–31 August 2017; pp. 1–6. [Google Scholar]
- Labayen, V.; Magaña, E.; Morató, D.; Izal, M. Online classification of user activities using machine learning on network traffic. Comput. Netw. 2020, 181, 107557. [Google Scholar] [CrossRef]
- Bezawada, B.; Bachani, M.; Peterson, J.; Shirazi, H.; Ray, I.; Ray, I. Behavioral fingerprinting of iot devices. In Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, Toronto, ON, Canada, 19 October 2018; pp. 41–50. [Google Scholar]
- Lopez-Martin, M.; Carro, B.; Sanchez-Esguevillas, A.; Lloret, J. Network traffic classifier with convolutional and recurrent neural networks for Internet of Things. IEEE Access 2017, 5, 18042–18050. [Google Scholar] [CrossRef]
- Byeon, S.; Yoon, K.; Yang, C.; Choi, S. STRALE: Mobility-aware PHY rate and frame aggregation length adaptation in WLANs. In Proceedings of the IEEE INFOCOM 2017—IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar] [CrossRef]
- Khorov, E.; Kiryanov, A.; Lyakhov, A.; Bianchi, G. A tutorial on IEEE 802.11ax high efficiency WLANs. IEEE Commun. Surv. Tutor. 2018, 21, 197–216. [Google Scholar] [CrossRef]
- Kornycky, J.; Abdul-Hameed, O.; Kondoz, A.; Barber, B.C. Radio Frequency Traffic Classification Over WLAN. IEEE/ACM Trans. Netw. 2017, 25, 56–68. [Google Scholar] [CrossRef] [Green Version]
- Zhang, J.; Li, F.; Ye, F.; Wu, H. Autonomous Unknown-Application Filtering and Labeling for DL-based Traffic Classifier Update. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 397–405. [Google Scholar] [CrossRef]
- Jabez, J.; Muthukumar, B. Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach. Procedia Comput. Sci. 2015, 48, 338–346. [Google Scholar] [CrossRef] [Green Version]
- Jamshed, M.A.; Moon, Y.; Kim, D.; Han, D.; Park, K. mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27–29 March 2017; USENIX Association: Boston, MA, USA, 2017; pp. 113–129. [Google Scholar]
- Li, Y.; Liang, B.; Tizghadam, A. Robust Online Learning against Malicious Manipulation and Feedback Delay With Application to Network Flow Classification. IEEE J. Sel. Areas Commun. 2021, 39, 2648–2663. [Google Scholar] [CrossRef]
- Blake, S.; Black, D.; Carlson, M.; Davies, E.; Wang, Z.; Weiss, W. IETF-RFC 2475-An Architecture for Differentiated Services. IETF RFC. 1998. Available online: https://doi.org/10.17487/RFC2475 (accessed on 30 October 2021).
- Wireshark. Available online: https://www.wireshark.org/ (accessed on 30 October 2021).
- Stuart, A.; Kendall, M.G. The Advanced Theory of Statistics; Griffin: London, UK, 1963. [Google Scholar]
- Glover, S.; Dixon, P. Likelihood ratios: A simple and flexible statistic for empirical psychologists. Psychon. Bull. Rev. 2004, 11, 791–806. [Google Scholar] [CrossRef] [PubMed]
- Tan, K.; Song, J.; Zhang, Q.; Sridharan, M. A Compound TCP Approach for High-Speed and Long Distance Networks; Technical Report MSR-TR-2005-86; July 2005; Available online: https://www.microsoft.com/en-us/research/publication/a-compound-tcp-approach-for-high-speed-and-long-distance-networks/ (accessed on 30 October 2021).
- iptime. Available online: http://iptime.com/ (accessed on 30 October 2021).
- tp-link. Available online: https://www.tp-link.com/us/ (accessed on 30 October 2021).
- Regulation (EU) 2015/2120 of the European Parliament and of the Council. Article 3. November 2015. Available online: http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2015.310.01.0001.01.ENG (accessed on 30 October 2021).
Standard | Slot Time (s) | DIFS (s) |
---|---|---|
802.11b | 20 | 50 |
802.11a | 9 | 34 |
802.11g | 9 or 20 | 28 or 50 |
802.11n (2.4 GHz) | 9 or 20 | 28 or 50 |
802.11n (5 GHz) | 9 | 34 |
802.11ac | 9 | 34 |
Accurate Identification Rate (%) | 28.9% | 96.4% | 97.8% |
False Positive Ratio (%) | 5.4% | 0.1% | 0.0% |
Average of Identification Time (s) | 0.1034 | 0.6803 | 3.724 |
Accurate Identification Rate (%) | 83.6% | 99.9% | 100.0% |
False Positive Ratio (%) | 13.9% | 0.1% | 0.0% |
Average of Identification Time (s) | 0.1075 | 0.7278 | 3.7314 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, S.; Yoo, J.; Choi, J. Weigh-in-Motion: Lightweight Real-Time Identification of Gbps Wireless Traffic. Sensors 2022, 22, 437. https://doi.org/10.3390/s22020437
Kim S, Yoo J, Choi J. Weigh-in-Motion: Lightweight Real-Time Identification of Gbps Wireless Traffic. Sensors. 2022; 22(2):437. https://doi.org/10.3390/s22020437
Chicago/Turabian StyleKim, Sungsoo, Joon Yoo, and Jaehyuk Choi. 2022. "Weigh-in-Motion: Lightweight Real-Time Identification of Gbps Wireless Traffic" Sensors 22, no. 2: 437. https://doi.org/10.3390/s22020437
APA StyleKim, S., Yoo, J., & Choi, J. (2022). Weigh-in-Motion: Lightweight Real-Time Identification of Gbps Wireless Traffic. Sensors, 22(2), 437. https://doi.org/10.3390/s22020437