Identification of probe request attacks in WLANs using neural networks

作者: Deepthi N. Ratnayake , Hassan B. Kazemian , Syed A. Yusuf

DOI: 10.1007/S00521-013-1478-8

关键词: Local area networkNetwork administratorIEEE 802.11Identification (information)Wireless lanSpoofing attackComputer securityAdversaryDenial-of-service attackComputer networkMedia access controlComputer scienceIntrusion detection system

摘要: Any sniffer can see the information sent through unprotected `probe request messages' and response in wireless local area networks (WLAN). A station (STA) send probe requests to trigger responses by simply spoofing a genuine media access control (MAC) address deceive point (AP) controlled list. Adversaries exploit these weaknesses flood APs with requests, which generate denial of service (DoS) STAs. The research examines traffic WLAN using supervised feed-forward neural network classifier identify frames from rogue frames. novel feature this approach is capture user attacker training data separately label them prior without administrator's intervention. model's performance validated self-consistency fivefold cross-validation tests. simulation comprehensive takes into account real-world environment. results show that detects attacks extremely well. This solution also an attack during early stage communication, so it prevent any other when adversary contemplates start breaking network.

参考文章(34)
A. C. C. Coolen, A Beginner’s Guide to the Mathematics of Neural Networks Concepts for Neural Networks. pp. 13- 70 ,(1998) , 10.1007/978-1-4471-3427-5_2
Levent Ertöz, Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava, Aysel Ozgur, A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. siam international conference on data mining. pp. 25- 36 ,(2003)
Gilbert Ramirez, Joshua Wright, Angela Orebaugh, Jay Beale, Wireshark & Ethereal Network Protocol Analyzer Toolkit ,(2007)
Hung-Jen Liao, Chun-Hung Richard Lin, Ying-Chih Lin, Kuang-Yuan Tung, Review: Intrusion detection system: A comprehensive review Journal of Network and Computer Applications. ,vol. 36, pp. 16- 24 ,(2013) , 10.1016/J.JNCA.2012.09.004
Stefan Savage, John Bellardo, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions usenix security symposium. pp. 2- 2 ,(2003)
Hongyu Yang, Lixia Xie, Jizhou Sun, Intrusion detection solution to WLANs ieee circuits and systems symposium on emerging technologies. ,vol. 2, pp. 553- 556 ,(2004) , 10.1109/CASSET.2004.1321948
Ibrahim AlShourbaji, Rafat AlAmeer, Wireless Intrusion Detection Systems (WIDS) arXiv: Cryptography and Security. ,(2013)
John C. Mitchell, Changhua He, Security Analysis and Improvements for IEEE 802.11i. network and distributed system security symposium. ,(2005)