Skip to main content
Top

2017 | OriginalPaper | Chapter

Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

Authors : Muhamad Erza Aminanto, Kwangjo Kim

Published in: Information Security Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

WiFi network traffics will be expected to increase sharply in the coming years, since WiFi network is commonly used for local area connectivity. Unfortunately, there are difficulties in WiFi network research beforehand, since there is no common dataset between researchers on this area. Recently, AWID dataset was published as a comprehensive WiFi network dataset, which derived from real WiFi traces. The previous work on this AWID dataset was unable to classify Impersonation Attack sufficiently. Hence, we focus on optimizing the Impersonation Attack detection. Feature selection can overcome this problem by selecting the most important features for detecting an arbitrary class. We leverage Artificial Neural Network (ANN) for the feature selection and apply Stacked Auto Encoder (SAE), a deep learning algorithm as a classifier for AWID Dataset. Our experiments show that the reduced input features have significantly improved to detect the Impersonation Attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutorials 18(1), 184–208 (2015). IEEECrossRef Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutorials 18(1), 184–208 (2015). IEEECrossRef
3.
go back to reference Kayacik, H., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, PST (2005) Kayacik, H., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, PST (2005)
4.
go back to reference Alotaibi, B.: A majority voting technique for wireless intrusion detection systems, University of Bridgeport (2016) Alotaibi, B.: A majority voting technique for wireless intrusion detection systems, University of Bridgeport (2016)
5.
go back to reference Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy (2010) Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy (2010)
6.
go back to reference Zaman, S., Karray, F.: Lightweight IDS based on features selection and IDS classification scheme. In: International Conference on IEEE Computational Science and Engineering, CSE 2009, vol. 3, pp. 365–370. IEEE (2009) Zaman, S., Karray, F.: Lightweight IDS based on features selection and IDS classification scheme. In: International Conference on IEEE Computational Science and Engineering, CSE 2009, vol. 3, pp. 365–370. IEEE (2009)
7.
go back to reference Louvieris, P., Clewley, N., Liu, X.: Effects-based feature identification for network intrusion detection. Neurocomputing 121, 265–273 (2013). Elsevier, IEEECrossRef Louvieris, P., Clewley, N., Liu, X.: Effects-based feature identification for network intrusion detection. Neurocomputing 121, 265–273 (2013). Elsevier, IEEECrossRef
8.
go back to reference Usha, M., Kavitha, P.: Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier. Wireless Netw. J. Mob. Commun. Comput. Inf. 22, 1–16 (2016). Springer Usha, M., Kavitha, P.: Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier. Wireless Netw. J. Mob. Commun. Comput. Inf. 22, 1–16 (2016). Springer
9.
go back to reference Wang, Z.: The Application of Deep Learning on Traffic Identification. BlackHat, USA (2015) Wang, Z.: The Application of Deep Learning on Traffic Identification. BlackHat, USA (2015)
10.
go back to reference Sabhnani, M., Serpen, G.: Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. In: Proceedings of the International Conference on Machine Learning: Models, Technologies, and Applications, pp. 209–215 (2003) Sabhnani, M., Serpen, G.: Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. In: Proceedings of the International Conference on Machine Learning: Models, Technologies, and Applications, pp. 209–215 (2003)
11.
go back to reference Palmieri, F., Fiore, U., Castiglione, A.: A distributed approach to network anomaly detection based on independent component analysis. In: Concurrency Computation Practice and Experience, Bd. 26, Nr. 6, S., pp. 1113–1129. Wiley (2013) Palmieri, F., Fiore, U., Castiglione, A.: A distributed approach to network anomaly detection based on independent component analysis. In: Concurrency Computation Practice and Experience, Bd. 26, Nr. 6, S., pp. 1113–1129. Wiley (2013)
Metadata
Title
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
Authors
Muhamad Erza Aminanto
Kwangjo Kim
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-56549-1_12

Premium Partner