Abstract
WiFi network traffics will be expected to increase sharply in the coming years, since WiFi network is commonly used for local area connectivity. Unfortunately, there are difficulties in WiFi network research beforehand, since there is no common dataset between researchers on this area. Recently, AWID dataset was published as a comprehensive WiFi network dataset, which derived from real WiFi traces. The previous work on this AWID dataset was unable to classify Impersonation Attack sufficiently. Hence, we focus on optimizing the Impersonation Attack detection. Feature selection can overcome this problem by selecting the most important features for detecting an arbitrary class. We leverage Artificial Neural Network (ANN) for the feature selection and apply Stacked Auto Encoder (SAE), a deep learning algorithm as a classifier for AWID Dataset. Our experiments show that the reduced input features have significantly improved to detect the Impersonation Attack.
This work was partly supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (B0101-16-1270, Research on Communication Technology using Bio-Inspired Algorithm) and the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. NRF-2015R1A2A2A01006812).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cisco Visual Networking Index: Forecast and Methodology, 2015–2020. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html
Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutorials 18(1), 184–208 (2015). IEEE
Kayacik, H., Zincir-Heywood, A.N., Heywood, M.I.: Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the 3rd Annual Conference on Privacy, Security and Trust, PST (2005)
Alotaibi, B.: A majority voting technique for wireless intrusion detection systems, University of Bridgeport (2016)
Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy (2010)
Zaman, S., Karray, F.: Lightweight IDS based on features selection and IDS classification scheme. In: International Conference on IEEE Computational Science and Engineering, CSE 2009, vol. 3, pp. 365–370. IEEE (2009)
Louvieris, P., Clewley, N., Liu, X.: Effects-based feature identification for network intrusion detection. Neurocomputing 121, 265–273 (2013). Elsevier, IEEE
Usha, M., Kavitha, P.: Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier. Wireless Netw. J. Mob. Commun. Comput. Inf. 22, 1–16 (2016). Springer
Wang, Z.: The Application of Deep Learning on Traffic Identification. BlackHat, USA (2015)
Sabhnani, M., Serpen, G.: Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. In: Proceedings of the International Conference on Machine Learning: Models, Technologies, and Applications, pp. 209–215 (2003)
Palmieri, F., Fiore, U., Castiglione, A.: A distributed approach to network anomaly detection based on independent component analysis. In: Concurrency Computation Practice and Experience, Bd. 26, Nr. 6, S., pp. 1113–1129. Wiley (2013)
Acknowledgment
The authors are very grateful to anonymous reviewers for their valuable feedbacks and suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Aminanto, M.E., Kim, K. (2017). Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-56549-1_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-56548-4
Online ISBN: 978-3-319-56549-1
eBook Packages: Computer ScienceComputer Science (R0)