Please use this identifier to cite or link to this item:
|Title:||Redundant sniffer deployment for multi-channel wireless network forensics with unreliable conditions||Authors:||Xu, J.
|Keywords:||Engineering::Computer science and engineering||Issue Date:||2020||Source:||Xu, J., Gong, S., Zou, Y., Liu, W., Zeng, K. & Niyato, D. (2020). Redundant sniffer deployment for multi-channel wireless network forensics with unreliable conditions. IEEE Transactions On Cognitive Communications and Networking, 6(1), 394-407. https://dx.doi.org/10.1109/TCCN.2019.2937487||Journal:||IEEE Transactions on Cognitive Communications and Networking||Abstract:||Network forensics refers to monitoring and analysis of network traffic for the purpose of information gathering, legal evidence, or intrusion detection. Wireless sniffers are usually deployed to collect PHY/MAC-layer information to trace abnormal wireless traffic. For multi-channel wireless networks, it becomes problematic to allocate each sniffer an appropriate monitoring channel due to the limited number of sniffers. This leads to the sniffer-channel assignment (SCA) problem that has been mostly studied assuming error-free channel conditions or known behavior of wireless users. In this paper, we study the SCA problem with more general settings. In particular, we introduce redundant sniffer deployment to combat against the unreliable channel conditions. This can be formulated as a non-linear integer program with the aim of maximizing the number of captured data packets. We propose both centralized and distributed algorithms to determine an optimal strategy. For unknown user behaviors, we formulate the redundant SCA problem as a multi-armed bandit problem and develop an online learning policy to find a balance between the exploitation, i.e., accuracy, and exploration, i.e., coverage, in channel monitoring. Simulation results reveal that the redundant sniffer deployment, though sacrificing the exploration opportunities in the learning process, is robust against the uncertainty of user activities and provides the optimal performance in terms of sensing accuracy and monitoring coverage.||URI:||https://hdl.handle.net/10356/154193||ISSN:||2332-7731||DOI:||10.1109/TCCN.2019.2937487||Rights:||© 2019 IEEE. All rights reserved.||Fulltext Permission:||none||Fulltext Availability:||No Fulltext|
|Appears in Collections:||SCSE Journal Articles|
Updated on Dec 23, 2021
Updated on May 21, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.