CNN-based Intrusion Classification for IEEE 802.11 Wireless Networks

WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future wireless network through being integrated with 5G cellular networks. However, security threats are still a big concern for WiFi due to the open...

Full description

Saved in:
Bibliographic Details
Published in2020 IEEE 6th International Conference on Computer and Communications (ICCC) pp. 830 - 833
Main Authors Duan, Qiang, Wei, Xianglin, Fan, Jianhua, Yu, Long, Hu, Yongyang
Format Conference Proceeding
LanguageEnglish
Published IEEE 11.12.2020
Subjects
Online AccessGet full text
DOI10.1109/ICCC51575.2020.9345293

Cover

Abstract WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future wireless network through being integrated with 5G cellular networks. However, security threats are still a big concern for WiFi due to the open share nature of wireless medium and the easy-access to WiFi intrusion tools. Therefore, it plays a critical role to identify the experienced attacks for applying further intrusion handling methods. However, existing intrusion detection methods based on traditional machine learning technique usually bears low detection accuracy and need a lot of human intervention. In this backdrop, this paper presents a convolutional neural network (CNN)-based intrusion detection algorithm for WiFi networks. Firstly, we present the detection framework, which first conducts data pre-processing, and then a CNN is trained for attack identification. To reduce both the risk of data overfit and the network training time, Dropout technique is adopted and different network structures are investigated. Experimental results on an open data set named AWID have shown that our algorithm greatly outperform existing ones, and its identification accuracy is higher than 99%.
AbstractList WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future wireless network through being integrated with 5G cellular networks. However, security threats are still a big concern for WiFi due to the open share nature of wireless medium and the easy-access to WiFi intrusion tools. Therefore, it plays a critical role to identify the experienced attacks for applying further intrusion handling methods. However, existing intrusion detection methods based on traditional machine learning technique usually bears low detection accuracy and need a lot of human intervention. In this backdrop, this paper presents a convolutional neural network (CNN)-based intrusion detection algorithm for WiFi networks. Firstly, we present the detection framework, which first conducts data pre-processing, and then a CNN is trained for attack identification. To reduce both the risk of data overfit and the network training time, Dropout technique is adopted and different network structures are investigated. Experimental results on an open data set named AWID have shown that our algorithm greatly outperform existing ones, and its identification accuracy is higher than 99%.
Author Yu, Long
Duan, Qiang
Wei, Xianglin
Fan, Jianhua
Hu, Yongyang
Author_xml – sequence: 1
  givenname: Qiang
  surname: Duan
  fullname: Duan, Qiang
  organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007
– sequence: 2
  givenname: Xianglin
  surname: Wei
  fullname: Wei, Xianglin
  email: 2780898225@qq.com
  organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007
– sequence: 3
  givenname: Jianhua
  surname: Fan
  fullname: Fan, Jianhua
  organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007
– sequence: 4
  givenname: Long
  surname: Yu
  fullname: Yu, Long
  organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007
– sequence: 5
  givenname: Yongyang
  surname: Hu
  fullname: Hu, Yongyang
  organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007
BookMark eNotj8FKxDAUACPowV39AkHyA63vJU2bHCVWt7DUyy4el6T7AsHaSlIR_14X9zTMZWBW7HKaJ2LsHqFEBPPQWWsVqkaVAgSURlZKGHnBVtgIjbqWSl-zJ9v3hXeZjryblvSV4zxxO7qcY4iDW04a5sS7tm25BvGX5m8x0Ug5856W7zm95xt2FdyY6fbMNds_tzu7KbavL5193BYRUS9FFZwxhGaQ0HgB4eS1luhoCGRwQK_JmSMZVSFALRCEFg3V0mvf1ODlmt39dyMRHT5T_HDp53Aek79dl0ZS
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCC51575.2020.9345293
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728186358
9781728186351
EndPage 833
ExternalDocumentID 9345293
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-4fa99e19c307b20f4fa96831aecfe91c1b8ea9de95410062102827e63b8b760b3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:42 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-4fa99e19c307b20f4fa96831aecfe91c1b8ea9de95410062102827e63b8b760b3
PageCount 4
ParticipantIDs ieee_primary_9345293
PublicationCentury 2000
PublicationDate 2020-Dec.-11
PublicationDateYYYYMMDD 2020-12-11
PublicationDate_xml – month: 12
  year: 2020
  text: 2020-Dec.-11
  day: 11
PublicationDecade 2020
PublicationTitle 2020 IEEE 6th International Conference on Computer and Communications (ICCC)
PublicationTitleAbbrev ICCC
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8110486
Snippet WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future...
SourceID ieee
SourceType Publisher
StartPage 830
SubjectTerms Communication system security
component
convolutional neural network
Convolutional neural networks
Intrusion detection
Proposals
Training
Wireless fidelity
Wireless networks
wireless networks detection
Title CNN-based Intrusion Classification for IEEE 802.11 Wireless Networks
URI https://ieeexplore.ieee.org/document/9345293
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT4MwFG62nTyp2Yy_04NHy1oopT2jy2Yy4sEluy0UHonRMBPZxb_e9wBnNB68ASGF91r6vUe_r4-xGwsuVJVXwqooFjrKjUCc8SIJSbdrSq00iZOXmZmv9MM6Xg_Y7V4LAwAt-QwCOmzX8sttsaNfZVMX0TJhNGRDHGadVqsX_Srppos0TRGdkxizvlAG_c0_qqa0oDE7ZMuvx3VckZdg1_ig-Pi1E-N_3-eITb7lefxxDzzHbAD1mN2lWSYIk0q-qElJgQ7nbclLIgO1_ucYoHLK7riVIVrDifr6ilMdzzoy-PuErWb3T-lc9CUSxDNmBo3QVe4cKFfgp-pDWdG5sZHKoajAqUJ5C7krwcVakVySwokwARN56xMjfXTCRvW2hlPGlQlBWrA44eVaQoWBSZFDgoCPjSljztiYPLB563bB2PTGn_99-YIdUC8Q8UOpSzZCu-EK4bvx122_fQK8SplU
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELVKGWAC1CK-8cCI0zhxHHsOVC20EUMrdavi5CIhUIpEu_DruUtCEYiBLYmi2L5T_O7s93yM3RiwgSydFEaGkVBhpgXijBNxQLpdXSipSJw8TfVorh4W0aLDbrdaGACoyWfg0WW9l1-s8g0tlQ1sSNuE4Q7bRdxXUaPWamW_0reDcZIkiM9xhHlf4Hvt6z_qptSwMTxg068GG7bIi7dZOy__-HUW4397dMj63wI9_rSFniPWgarH7pI0FYRKBR9XpKVAk_O66CXRgWoPcAxROeV33PgBjoYT-fUVJzueNnTw9z6bD-9nyUi0RRLEM-YGa6HKzFqQNsef1QV-SffahDKDvAQrc-kMZLYAGylJgkkKKIIYdOiMi7XvwmPWrVYVnDAudQC-AYNTXqZ8KDE0yTOIEfLxY1LrU9YjCyzfmnMwlu3gz_5-fM32RrPpZDkZp4_nbJ88QjQQKS9YF20Alwjma3dV-_AT9s-coQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+6th+International+Conference+on+Computer+and+Communications+%28ICCC%29&rft.atitle=CNN-based+Intrusion+Classification+for+IEEE+802.11+Wireless+Networks&rft.au=Duan%2C+Qiang&rft.au=Wei%2C+Xianglin&rft.au=Fan%2C+Jianhua&rft.au=Yu%2C+Long&rft.date=2020-12-11&rft.pub=IEEE&rft.spage=830&rft.epage=833&rft_id=info:doi/10.1109%2FICCC51575.2020.9345293&rft.externalDocID=9345293