loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Deepthi N. Ratnayake 1 ; Hassan B. Kazemian 1 and Syed A. Yusuf 2

Affiliations: 1 Faculty of Computing and London Metropolitan University, United Kingdom ; 2 University of Portsmouth, United Kingdom

Keyword(s): Wlan Security, Probe Request Flooding Attacks, Neural Networks, Genetic Algorithms.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention ; Wireless Network Security

Abstract: The Media Access Control (MAC) layer of the wireless protocol, Institute of Electrical and Electronics Engineers (IEEE) 802.11, is based on the exchange of request and response messages. Probe Request Flooding Attacks (PRFA) are devised based on this design flaw to reduce network performance or prevent legitimate users from accessing network resources. The vulnerability is amplified due to clear beacon, probe request and probe response frames. The research is to detect PRFA of Wireless Local Area Networks (WLAN) using a Supervised Feedforward Neural Network (NN). The NN converged outstandingly with train, valid, test sample percentages 70, 15, 15 and hidden neurons 20. The effectiveness of an Intruder Detection System depends on its prediction accuracy. This paper presents optimisation of the NN using Genetic Algorithms (GA). GAs sought to maximise the performance of the model based on Linear Regression (R) and generated R > 0.95. Novelty of this research lies in the fact that the NN accepts user and attacker training data captured separately. Hence, security administrators do not have to perform the painstaking task of manually identifying individual frames for labelling prior training. The GA provides a reliable NN model and recognises the behaviour of the NN for diverse configurations. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.145.57.5

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
N. Ratnayake, D.; B. Kazemian, H. and A. Yusuf, S. (2012). Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm. In Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT; ISBN 978-989-8565-24-2; ISSN 2184-3236, SciTePress, pages 345-350. DOI: 10.5220/0004077703450350

@conference{secrypt12,
author={Deepthi {N. Ratnayake}. and Hassan {B. Kazemian}. and Syed {A. Yusuf}.},
title={Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT},
year={2012},
pages={345-350},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004077703450350},
isbn={978-989-8565-24-2},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2012) - SECRYPT
TI - Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm
SN - 978-989-8565-24-2
IS - 2184-3236
AU - N. Ratnayake, D.
AU - B. Kazemian, H.
AU - A. Yusuf, S.
PY - 2012
SP - 345
EP - 350
DO - 10.5220/0004077703450350
PB - SciTePress