Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

被引:16
|
作者
Aminanto, Muhamad Erza [1 ]
Kim, Kwangjo [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Comp, Cryptol & Informat Secur Lab, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
10.1007/978-3-319-56549-1_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WiFi network traffics will be expected to increase sharply in the coming years, since WiFi network is commonly used for local area connectivity. Unfortunately, there are difficulties in WiFi network research beforehand, since there is no common dataset between researchers on this area. Recently, AWID dataset was published as a comprehensive WiFi network dataset, which derived from real WiFi traces. The previous work on this AWID dataset was unable to classify Impersonation Attack sufficiently. Hence, we focus on optimizing the Impersonation Attack detection. Feature selection can overcome this problem by selecting the most important features for detecting an arbitrary class. We leverage Artificial Neural Network (ANN) for the feature selection and apply Stacked Auto Encoder (SAE), a deep learning algorithm as a classifier for AWID Dataset. Our experiments show that the reduced input features have significantly improved to detect the Impersonation Attack.
引用
收藏
页码:136 / 147
页数:12
相关论文
共 50 条
  • [31] Detecting noncrystallographic symmetry in Icosahedral Viruses using deep learning approach
    Mohamed, Nora Abd El-Hameed
    Nassef, Mohammad
    Al-Sadek, Ahmed Farouk
    Badr, Amr A.
    [J]. BIOSCIENCE RESEARCH, 2019, 16 (03): : 3210 - 3216
  • [32] BreakNet: detecting deletions using long reads and a deep learning approach
    Junwei Luo
    Hongyu Ding
    Jiquan Shen
    Haixia Zhai
    Zhengjiang Wu
    Chaokun Yan
    Huimin Luo
    [J]. BMC Bioinformatics, 22
  • [33] Green MEC Networks Design Under UAV Attack: A Deep Reinforcement Learning Approach
    Zhao, Rui
    Xia, Junjuan
    Zhao, Zichao
    Lai, Shiwei
    Fan, Lisheng
    Li, Dong
    [J]. IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (03): : 1248 - 1258
  • [34] BreakNet: detecting deletions using long reads and a deep learning approach
    Luo, Junwei
    Ding, Hongyu
    Shen, Jiquan
    Zhai, Haixia
    Wu, Zhengjiang
    Yan, Chaokun
    Luo, Huimin
    [J]. BMC BIOINFORMATICS, 2021, 22 (01)
  • [35] Cyber Attack of a Power Grid Analysis Using a Deep Neural Networks Approach
    Dogaru, Delia Ioana
    Dumitrache, Ioan
    [J]. CONTROL ENGINEERING AND APPLIED INFORMATICS, 2019, 21 (01): : 42 - 50
  • [36] Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller
    Mansoor, Amran
    Anbar, Mohammed
    Bahashwan, Abdullah Ahmed
    Alabsi, Basim Ahmad
    Rihan, Shaza Dawood Ahmed
    [J]. SYSTEMS, 2023, 11 (06):
  • [37] Detecting Server-Side Request Forgery (SSRF) Attack by using Deep Learning Techniques
    Al-talak, Khadejah
    Abbass, Onytra
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 228 - 234
  • [38] Detecting impersonation attacks in cloud computing environments using a centric user profiling approach
    Kholidy, Hisham A.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 117 : 299 - 320
  • [39] Learning From Errors: Detecting Cross-Technology Interference in WiFi Networks
    Croce, Daniele
    Garlisi, Domenico
    Giuliano, Fabrizio
    Inzerillo, Nicola
    Tinnirello, Ilenia
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2018, 4 (02) : 347 - 356
  • [40] Detecting Defects in PCB using Deep Learning via Convolution Neural Networks
    Adibhatla, Venkat Anil
    Shieh, Jiann-Shing
    Abbod, Maysam F.
    Chih, Huan-Chuang
    Hsu, Chi-Chang
    Cheng, Joseph
    [J]. 2018 13TH INTERNATIONAL MICROSYSTEMS, PACKAGING, ASSEMBLY AND CIRCUITS TECHNOLOGY CONFERENCE (IMPACT), 2018, : 202 - 205