Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization

被引:0
作者
Mayank Agarwal
Dileep Pasumarthi
Santosh Biswas
Sukumar Nandi
机构
[1] Indian Institute of Technology,Department of Computer Science and Engineering
来源
International Journal of Machine Learning and Cybernetics | 2016年 / 7卷
关键词
802.11; Flooding DoS attacks; Wi-Fi networks ; Intrusion detection system; Machine learning; Sniffer ; Localization;
D O I
暂无
中图分类号
学科分类号
摘要
IEEE 802.11 Wi-Fi networks are prone to a large number of Denial of Service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of 802.11 protocol. In this work, we focus on the flooding DoS attacks in Wi-Fi networks. In flooding DoS attacks, a large number of legitimate looking spoofed requests are transmitted to a victim access point (AP). The processing of large number of spoofed frames results in a huge load at the AP, resulting in a flooding DoS attack. Current methods to detect the flooding DoS use encryption, signal characteristics, protocol modification, upgradation to newer standards etc. which are often expensive to operate and maintain. In this paper, we propose a novel Machine Learning (ML) based intrusion detection system along with intrusion prevention system (IPS) that not only detects the flooding DoS attacks in Wi-Fi networks, but also helps the victim station (STA) in recovering swiftly from the attack. To the best of our knowledge, the usage of ML based techniques for detection of flooding DoS attacks in 802.11 networks has largely been unexplored. The ML based IDS detects the flooding DoS attacks with a high accuracy (precision) and detection rate (recall). After the attack is detected, the location of the attacker is ascertained using Angle of Arrival based localization algorithm and traffic coming from the attacker region is blocked which helps in mitigating the effect of flooding DoS attack.
引用
收藏
页码:1035 / 1051
页数:16
相关论文
共 33 条
[1]  
Bernaschi M(2008)Access points vulnerabilities to DoS attacks in 802.11 networks Wirel Netw 14 159-169
[2]  
Ferreri F(2005)Long-term prediction of discharges in manwan hydropower using adaptive-network-based fuzzy inference systems models Adv Nat Comput Lect Notes Comput Sci 3612 1152-1161
[3]  
Valcamonici L(1992)Performance analysis of bearing-only target location algorithms IEEE Trans Aerosp Electron Syst 28 817-828
[4]  
Cheng CT(2009)The WEKA Data Mining Software: an update SIGKDD Explor 11 10-18
[5]  
Lin JY(2007)Wireless sensor network localization techniques Comput Netw 51 2529-2553
[6]  
Sun YG(1996)A methodology for testing intrusion detection systems IEEE Trans Softw Eng 22 719-729
[7]  
Chau K(2004)A key recovery attack on the 802.11b Wired Equivalent Privacy Protocol (WEP) ACM Trans Inf Syst Secur 7 319-332
[8]  
Gavish M(2007)Breaking 104 Bit WEP in less than 60 seconds Inf Secur Appl Lect Notes Comput Sci 4867 188-202
[9]  
Weiss A(2012)Calibration of Xinanjiang model parameters using hybrid genetic algorithm based fuzzy optimal model J Hydroinform 14 784-799
[10]  
Hall M(undefined)undefined undefined undefined undefined-undefined