Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

被引:16
|
作者
Aminanto, Muhamad Erza [1 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Cryptol & Informat Secur Lab, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
10.1007/978-3-319-56549-1_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WiFi network traffics will be expected to increase sharply in the coming years, since WiFi network is commonly used for local area connectivity. Unfortunately, there are difficulties in WiFi network research beforehand, since there is no common dataset between researchers on this area. Recently, AWID dataset was published as a comprehensive WiFi network dataset, which derived from real WiFi traces. The previous work on this AWID dataset was unable to classify Impersonation Attack sufficiently. Hence, we focus on optimizing the Impersonation Attack detection. Feature selection can overcome this problem by selecting the most important features for detecting an arbitrary class. We leverage Artificial Neural Network (ANN) for the feature selection and apply Stacked Auto Encoder (SAE), a deep learning algorithm as a classifier for AWID Dataset. Our experiments show that the reduced input features have significantly improved to detect the Impersonation Attack.
引用
收藏
页码:136 / 147
页数:12
相关论文
共 50 条
  • [21] Approach for Detecting Arabic Fake News using Deep Learning
    Shaker, Khalid
    Alqudsi, Arwa
    [J]. Iraqi Journal for Computer Science and Mathematics, 2024, 5 (03): : 779 - 789
  • [22] Detecting impersonation attacks in future wireless and mobile networks
    Barbeau, Michel
    Hall, Jyanthi
    Kranakis, Evangelos
    [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 80 - 95
  • [23] Deep Learning in Indoor Localization Using WiFi
    Turgut, Zeynep
    Ustebay, Serpil
    Aydin, Gulsum Zeynep Gurkas
    Sertbas, Ahmet
    [J]. INTERNATIONAL TELECOMMUNICATIONS CONFERENCE, ITELCON 2017, 2019, 504 : 101 - 110
  • [24] Deep Learning for Detecting Building Defects Using Convolutional Neural Networks
    Perez, Husein
    Tah, Joseph H. M.
    Mosavi, Amir
    [J]. SENSORS, 2019, 19 (16)
  • [25] A Deep Learning Approach for Detecting Virtual Link Anomalies in LEO Satellite Networks
    Pang, Rui
    He, Lizhi
    Liu, Zhanjun
    Liang, Chengchao
    [J]. 2023 28TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS, APCC 2023, 2023, : 178 - 183
  • [26] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123
  • [27] IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction
    Lee, Seo Jin
    Yoo, Paul D.
    Asyhari, A. Taufiq
    Jhi, Yoonchan
    Chermak, Lounis
    Yeun, Chan Yeob
    Taha, Kamal
    [J]. IEEE ACCESS, 2020, 8 (08): : 65520 - 65529
  • [28] Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks
    Narayanadoss, Akash Raj
    Tram Truong-Huu
    Mohan, Purnima Murali
    Gurusamy, Mohan
    [J]. 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
  • [29] A Novel approach for detecting malware in Android applications using Deep learning
    Kaushik, Prashant
    Yadav, Pankaj K.
    [J]. 2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 59 - 62
  • [30] Detecting False Arrhythmias Alarms in the ICU Using a Deep Learning Approach
    Ardila, Karol
    Moreno, German
    Fajardo, Carlos A.
    Santos, Camilo
    [J]. 2024 XXIV SYMPOSIUM OF IMAGE, SIGNAL PROCESSING, AND ARTIFICIAL VISION, STSIVA 2024, 2024,