Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

被引:16
|
作者
Aminanto, Muhamad Erza [1 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Cryptol & Informat Secur Lab, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
10.1007/978-3-319-56549-1_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WiFi network traffics will be expected to increase sharply in the coming years, since WiFi network is commonly used for local area connectivity. Unfortunately, there are difficulties in WiFi network research beforehand, since there is no common dataset between researchers on this area. Recently, AWID dataset was published as a comprehensive WiFi network dataset, which derived from real WiFi traces. The previous work on this AWID dataset was unable to classify Impersonation Attack sufficiently. Hence, we focus on optimizing the Impersonation Attack detection. Feature selection can overcome this problem by selecting the most important features for detecting an arbitrary class. We leverage Artificial Neural Network (ANN) for the feature selection and apply Stacked Auto Encoder (SAE), a deep learning algorithm as a classifier for AWID Dataset. Our experiments show that the reduced input features have significantly improved to detect the Impersonation Attack.
引用
收藏
页码:136 / 147
页数:12
相关论文
共 50 条
  • [1] Detecting the RPL Version Number Attack in IoT Networks using Deep Learning Models
    Krari, Ayoub
    Hajami, Abdelmajid
    Jarmouni, Ezzitouni
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (10) : 614 - 623
  • [2] Impersonation Attack Detection in IoT Networks
    Dinh Duc Nha Nguyen
    Sood, Keshav
    Xiang, Yong
    Gao, Longxiang
    Chi, Lianhua
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6061 - 6066
  • [3] Deep Learning Approach for Attack Detection in Controller Area Networks
    Lee, Jungyeong
    Kim, Woocheol
    Cho, Jin-Hee
    Kim, Dong Seong
    Moore, Terrence J.
    Nelson, Frederica F.
    Lim, Hyuk
    [J]. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS III, 2021, 11746
  • [4] Detecting SPIT Attacks in VoIP Networks Using Convolutional Autoencoders: A Deep Learning Approach
    Nazih, Waleed
    Alnowaiser, Khaled
    Eldesouky, Esraa
    Youssef Atallah, Osama
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (12):
  • [5] Detecting Byzantine attack in cognitive radio networks using machine learning
    Sarmah, Rupam
    Taggu, Amar
    Marchang, Ningrinla
    [J]. WIRELESS NETWORKS, 2020, 26 (08) : 5939 - 5950
  • [6] Detecting Byzantine attack in cognitive radio networks using machine learning
    Rupam Sarmah
    Amar Taggu
    Ningrinla Marchang
    [J]. Wireless Networks, 2020, 26 : 5939 - 5950
  • [7] On a Machine Learning Approach for the Detection of Impersonation Attacks in Social Networks
    Villar-Rodriguez, Esther
    Del Ser, Javier
    Salcedo-Sanz, Sancho
    [J]. INTELLIGENT DISTRIBUTED COMPUTING VIII, 2015, 570 : 259 - 268
  • [8] Detecting Lombard Speech Using Deep Learning Approach
    Kakol, Krzysztof
    Korvel, Grazina
    Tamulevicius, Gintautas
    Kostek, Bozena
    [J]. SENSORS, 2023, 23 (01)
  • [9] A Deep Learning Approach for Detecting Malware Using Autoencoder
    Panchagnula, Venu Madhav
    Satya Keerthi, N.V.L.Ch.
    Surekha, S.
    Sujatha, R.
    Veeraiah, Duggineni
    Ramesh, Eluri
    Lakshmi, B.
    [J]. IAENG International Journal of Computer Science, 2024, 51 (08) : 1051 - 1059
  • [10] WiCount: A Deep Learning Approach for Crowd Counting Using WiFi Signals
    Liu, Shangqing
    Zhao, Yanchao
    Chen, Bing
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 967 - 974