Skip to main content
Top

2018 | OriginalPaper | Chapter

Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP

Authors : Doyeon Kim, Dongkyoo Shin, Dongil Shin

Published in: Advances in Computer Science and Ubiquitous Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the frequent use of Wi-Fi and hotspots that provide a wireless Internet environment, awareness and threats to wireless AP security are steadily increasing. Especially when using unauthorized APs in company, government and military facilities, there is a high possibility of being subjected to various viruses and hacking attacks. Therefore, it is necessary to detect and detect authorized APs and unauthorized APs. In this paper, to detect authorized APs and unauthorized APs, the characteristics of RTT (Round Trip Time) values are set as dataset and each machine learning algorithm SVM (Support Vector Machine), J48 (C4.5), KNN (K nearest neighbors), and MLP (Multilayer Perceptron).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jang, R.-H., et al.: Analysis of time-based unauthorized AP detection methods according to hardware performance of unauthorized AP. J. Korean Inst. Commun. Inf. Sci. 40(3), 551–558 (2015) Jang, R.-H., et al.: Analysis of time-based unauthorized AP detection methods according to hardware performance of unauthorized AP. J. Korean Inst. Commun. Inf. Sci. 40(3), 551–558 (2015)
2.
go back to reference Han, H., et al.: A timing-based scheme for rogue AP detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912–1925 (2011)CrossRef Han, H., et al.: A timing-based scheme for rogue AP detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912–1925 (2011)CrossRef
3.
go back to reference Lee, J., Lee, S., Moon, J.: Detecting rogue AP using k-SVM method. J. Korea Inst. Inf. Secur. Cryptol. 24(1), 87–95 (2014)CrossRef Lee, J., Lee, S., Moon, J.: Detecting rogue AP using k-SVM method. J. Korea Inst. Inf. Secur. Cryptol. 24(1), 87–95 (2014)CrossRef
4.
go back to reference Kang, S., Nyang, D., Choi, J., Lee, S.: Relaying rogue AP detection scheme using SVM. J. Korea Inst. Inf. Secur. Cryptol. (JKIISC) 23(3), 431–444 (2013)CrossRef Kang, S., Nyang, D., Choi, J., Lee, S.: Relaying rogue AP detection scheme using SVM. J. Korea Inst. Inf. Secur. Cryptol. (JKIISC) 23(3), 431–444 (2013)CrossRef
Metadata
Title
Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP
Authors
Doyeon Kim
Dongkyoo Shin
Dongil Shin
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_144