AN OPTIMAL DEEP EARNING MODEL FOR TRAFFIC ANALYSIS AND FRAME-BY-FRAME ATTACK DETECTION IN WI-FI NETWORKS

V.S.Bharathidasan1 , A. Prema Kirubakaran2

Abstract

The term "Wi-Fi" refers to the wireless local area network that affords internet access in numerous familiar places, including stores, restaurants, cafes, and college campuses. The Internet's unavailability, which allows for many attacks, has delayed and sometimes completely disrupted these services, although they were made possible by this technology. Therefore, due to their inherent weakness, wireless interfaces have spurred the study and suggestion of traffic investigation and anomaly detection systems. This study introduces a scalable and modular algorithm structure for setting up deep learning (DL) based on a Convolutional Deep Belief Network (CDBN) with a genetic algorithm (GA) named OCDBN to detect malicious frames reliably and To detect attacks, with features optimized via a GA. This model uses a dissimilarity measure that deals with non-numerical and numerical features. It also uses the Aegean Wi-Fi Intrusion Detection (AWID) dataset to test how well the suggested Algorithm works. This work found up to 12 of the 14 attack classes in the AWID dataset recognized with high confidence just by looking at a single frame, as long as the appropriate features are perceived.

Keywords:

:Network attacks, Traffic classification, Wi-Fi Networks, Malicious traffic detection, Clustering, deep learning, and Genetic Algorithm


Full Text:

PDF


References


1. Sengupta, S., Chowdhary, A., Sabur, A., Alshamrani, A., Huang, D., & Kambhampati, S. (2020). A survey of moving target defenses for network security. IEEE Communications Surveys & Tutorials, 22(3), 1909-1941. 2. A. Reyes, A., D. Vaca, F., Castro Aguayo, G. A., Niyaz, Q., & Devabhaktuni, V. (2020). A machine learning based two-stage Wi-Fi network intrusion detection system. Electronics, 9(10), 1689. 3. Zhao, Y. Z., Miao, C., Ma, M., Zhang, J. B., & Leung, C. (2012). A survey and projection on medium access control protocols for wireless sensor networks. ACM Computing Surveys (csuR), 45(1), 1-37. 4. Choi, W., Lim, H., & Sabharwal, A. (2015). Power-controlled medium access control protocol for full-duplex Wi-Fi networks. IEEE Transactions on Wireless Communications, 14(7), 3601-3613. 5. Granato, G., Martino, A., Baldini, L., & Rizzi, A. (2022). Intrusion Detection in Wi-Fi Networks by Modular and Optimized Ensemble of Classifiers: An Extended Analysis. SN Computer Science, 3(4), 1-17. 6. Aminanto, M. E., & Kim, K. (2017). Detecting active attacks in Wi-Fi network by semi-supervised deep learning. In Conference on Information Security and Cryptography. 7. Zhu, X., Ding, B., Li, W., Gu, L., & Yang, Y. (2018). On development of security monitoring system via wireless sensing network. EURASIP Journal on Wireless Communications and Networking, 2018(1), 1-10. 8. Dwivedi, S., Vardhan, M., & Tripathi, S. (2021). Multi-parallel adaptive grasshopper optimization technique for detecting anonymous attacks in wireless networks. Wireless Personal Communications, 119(3), 2787-2816. 9. Agarwal, M., Pasumarthi, D., Biswas, S., & Nandi, S. (2016). Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization. International Journal of Machine Learning and Cybernetics, 7(6), 1035-1051. 10. Mahini, H., & Mousavirad, S. M. (2020). Wi-Fi intrusion detection and prevention systems analyzing: a game theoretical perspective. International Journal of Wireless Information Networks, 27(1), 77-88. 11. Fu, A., Zhang, G., Zhu, Z., & Zhang, Y. (2014). Fast and secure handover authentication scheme based on ticket for WiMAX and Wi-Fi heterogeneous networks. Wireless personal communications, 79(2), 1277-1299. 12. Nivaashini, M., & Thangaraj, P. (2021). Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks. Wireless Networks, 27(4), 2761-2784. 13. Usha, M., & Kavitha, P. J. W. N. (2017). Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier. Wireless Networks, 23(8), 2431-2446. 14. Shrivastava, P., Jamal, M. S., & Kataoka, K. (2020). EvilScout: Detection and mitigation of evil twin attack in SDN enabled Wi-Fi. IEEE Transactions on Network and Service Management, 17(1), 89-102. 15. Ye, A., Li, Q., Zhang, Q., & Cheng, B. (2020). Detection of spoofing attacks in WLAN-based positioning systems using Wi-Fi hotspot tags. IEEE Access, 8, 39768-39780. 16. Sethuraman, S. C., Dhamodaran, S., & Vijayakumar, V. (2019). Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks. IET networks, 8(4), 219-232. 17. Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2015). Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), 184-208. 18. IS Association. (2012). IEEE standard for information technology–telecommunications and information exchange between systems local and metropolitan area networks–specific requirements part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. ANSI/IEEE Std, 802-11. 19. Hua, Y., Guo, J., & Zhao, H. (2015, January). Deep belief networks and deep learning. In Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things (pp. 1-4). IEEE. 20. Lee, H., Grosse, R., Ranganath, R., & Ng, A. Y. (2011). Unsupervised learning of hierarchical representations with convolutional deep belief networks. Communications of the ACM, 54(10), 95-103. 21. Rizzi, A., Granato, G., & Baiocchi, A. (2020). Frame-by-frame Wi-Fi attack detection algorithm with scalable and modular machine-learning design. Applied Soft Computing, 91, 106188.

Refbacks

  • There are currently no refbacks.