Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm

Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf

2012

Abstract

The Media Access Control (MAC) layer of the wireless protocol, Institute of Electrical and Electronics Engineers (IEEE) 802.11, is based on the exchange of request and response messages. Probe Request Flooding Attacks (PRFA) are devised based on this design flaw to reduce network performance or prevent legitimate users from accessing network resources. The vulnerability is amplified due to clear beacon, probe request and probe response frames. The research is to detect PRFA of Wireless Local Area Networks (WLAN) using a Supervised Feedforward Neural Network (NN). The NN converged outstandingly with train, valid, test sample percentages 70, 15, 15 and hidden neurons 20. The effectiveness of an Intruder Detection System depends on its prediction accuracy. This paper presents optimisation of the NN using Genetic Algorithms (GA). GAs sought to maximise the performance of the model based on Linear Regression (R) and generated R > 0.95. Novelty of this research lies in the fact that the NN accepts user and attacker training data captured separately. Hence, security administrators do not have to perform the painstaking task of manually identifying individual frames for labelling prior training. The GA provides a reliable NN model and recognises the behaviour of the NN for diverse configurations.

Download


Paper Citation


in Harvard Style

N. Ratnayake D., B. Kazemian H. and A. Yusuf S. (2012). Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 345-350. DOI: 10.5220/0004077703450350

in Bibtex Style

@conference{secrypt12,
author={Deepthi N. Ratnayake and Hassan B. Kazemian and Syed A. Yusuf},
title={Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={345-350},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004077703450350},
isbn={978-989-8565-24-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm
SN - 978-989-8565-24-2
AU - N. Ratnayake D.
AU - B. Kazemian H.
AU - A. Yusuf S.
PY - 2012
SP - 345
EP - 350
DO - 10.5220/0004077703450350