CNN-based Intrusion Classification for IEEE 802.11 Wireless Networks
WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future wireless network through being integrated with 5G cellular networks. However, security threats are still a big concern for WiFi due to the open...
Saved in:
Published in | 2020 IEEE 6th International Conference on Computer and Communications (ICCC) pp. 830 - 833 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
11.12.2020
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICCC51575.2020.9345293 |
Cover
Abstract | WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future wireless network through being integrated with 5G cellular networks. However, security threats are still a big concern for WiFi due to the open share nature of wireless medium and the easy-access to WiFi intrusion tools. Therefore, it plays a critical role to identify the experienced attacks for applying further intrusion handling methods. However, existing intrusion detection methods based on traditional machine learning technique usually bears low detection accuracy and need a lot of human intervention. In this backdrop, this paper presents a convolutional neural network (CNN)-based intrusion detection algorithm for WiFi networks. Firstly, we present the detection framework, which first conducts data pre-processing, and then a CNN is trained for attack identification. To reduce both the risk of data overfit and the network training time, Dropout technique is adopted and different network structures are investigated. Experimental results on an open data set named AWID have shown that our algorithm greatly outperform existing ones, and its identification accuracy is higher than 99%. |
---|---|
AbstractList | WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future wireless network through being integrated with 5G cellular networks. However, security threats are still a big concern for WiFi due to the open share nature of wireless medium and the easy-access to WiFi intrusion tools. Therefore, it plays a critical role to identify the experienced attacks for applying further intrusion handling methods. However, existing intrusion detection methods based on traditional machine learning technique usually bears low detection accuracy and need a lot of human intervention. In this backdrop, this paper presents a convolutional neural network (CNN)-based intrusion detection algorithm for WiFi networks. Firstly, we present the detection framework, which first conducts data pre-processing, and then a CNN is trained for attack identification. To reduce both the risk of data overfit and the network training time, Dropout technique is adopted and different network structures are investigated. Experimental results on an open data set named AWID have shown that our algorithm greatly outperform existing ones, and its identification accuracy is higher than 99%. |
Author | Yu, Long Duan, Qiang Wei, Xianglin Fan, Jianhua Hu, Yongyang |
Author_xml | – sequence: 1 givenname: Qiang surname: Duan fullname: Duan, Qiang organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007 – sequence: 2 givenname: Xianglin surname: Wei fullname: Wei, Xianglin email: 2780898225@qq.com organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007 – sequence: 3 givenname: Jianhua surname: Fan fullname: Fan, Jianhua organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007 – sequence: 4 givenname: Long surname: Yu fullname: Yu, Long organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007 – sequence: 5 givenname: Yongyang surname: Hu fullname: Hu, Yongyang organization: The 63rd Research Institute, National University of Defense Technology,Nanjing,China,21007 |
BookMark | eNotj8FKxDAUACPowV39AkHyA63vJU2bHCVWt7DUyy4el6T7AsHaSlIR_14X9zTMZWBW7HKaJ2LsHqFEBPPQWWsVqkaVAgSURlZKGHnBVtgIjbqWSl-zJ9v3hXeZjryblvSV4zxxO7qcY4iDW04a5sS7tm25BvGX5m8x0Ug5856W7zm95xt2FdyY6fbMNds_tzu7KbavL5193BYRUS9FFZwxhGaQ0HgB4eS1luhoCGRwQK_JmSMZVSFALRCEFg3V0mvf1ODlmt39dyMRHT5T_HDp53Aek79dl0ZS |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCC51575.2020.9345293 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1728186358 9781728186351 |
EndPage | 833 |
ExternalDocumentID | 9345293 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i118t-4fa99e19c307b20f4fa96831aecfe91c1b8ea9de95410062102827e63b8b760b3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:38:42 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i118t-4fa99e19c307b20f4fa96831aecfe91c1b8ea9de95410062102827e63b8b760b3 |
PageCount | 4 |
ParticipantIDs | ieee_primary_9345293 |
PublicationCentury | 2000 |
PublicationDate | 2020-Dec.-11 |
PublicationDateYYYYMMDD | 2020-12-11 |
PublicationDate_xml | – month: 12 year: 2020 text: 2020-Dec.-11 day: 11 |
PublicationDecade | 2020 |
PublicationTitle | 2020 IEEE 6th International Conference on Computer and Communications (ICCC) |
PublicationTitleAbbrev | ICCC |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8110486 |
Snippet | WiFi has been widely deployed to facilitate home, office, or even stadium-scale wireless access to the Internet, and will be an essential part of the future... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 830 |
SubjectTerms | Communication system security component convolutional neural network Convolutional neural networks Intrusion detection Proposals Training Wireless fidelity Wireless networks wireless networks detection |
Title | CNN-based Intrusion Classification for IEEE 802.11 Wireless Networks |
URI | https://ieeexplore.ieee.org/document/9345293 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT4MwFG62nTyp2Yy_04NHy1oopT2jy2Yy4sEluy0UHonRMBPZxb_e9wBnNB68ASGF91r6vUe_r4-xGwsuVJVXwqooFjrKjUCc8SIJSbdrSq00iZOXmZmv9MM6Xg_Y7V4LAwAt-QwCOmzX8sttsaNfZVMX0TJhNGRDHGadVqsX_Srppos0TRGdkxizvlAG_c0_qqa0oDE7ZMuvx3VckZdg1_ig-Pi1E-N_3-eITb7lefxxDzzHbAD1mN2lWSYIk0q-qElJgQ7nbclLIgO1_ucYoHLK7riVIVrDifr6ilMdzzoy-PuErWb3T-lc9CUSxDNmBo3QVe4cKFfgp-pDWdG5sZHKoajAqUJ5C7krwcVakVySwokwARN56xMjfXTCRvW2hlPGlQlBWrA44eVaQoWBSZFDgoCPjSljztiYPLB563bB2PTGn_99-YIdUC8Q8UOpSzZCu-EK4bvx122_fQK8SplU |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELVKGWAC1CK-8cCI0zhxHHsOVC20EUMrdavi5CIhUIpEu_DruUtCEYiBLYmi2L5T_O7s93yM3RiwgSydFEaGkVBhpgXijBNxQLpdXSipSJw8TfVorh4W0aLDbrdaGACoyWfg0WW9l1-s8g0tlQ1sSNuE4Q7bRdxXUaPWamW_0reDcZIkiM9xhHlf4Hvt6z_qptSwMTxg068GG7bIi7dZOy__-HUW4397dMj63wI9_rSFniPWgarH7pI0FYRKBR9XpKVAk_O66CXRgWoPcAxROeV33PgBjoYT-fUVJzueNnTw9z6bD-9nyUi0RRLEM-YGa6HKzFqQNsef1QV-SffahDKDvAQrc-kMZLYAGylJgkkKKIIYdOiMi7XvwmPWrVYVnDAudQC-AYNTXqZ8KDE0yTOIEfLxY1LrU9YjCyzfmnMwlu3gz_5-fM32RrPpZDkZp4_nbJ88QjQQKS9YF20Alwjma3dV-_AT9s-coQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+IEEE+6th+International+Conference+on+Computer+and+Communications+%28ICCC%29&rft.atitle=CNN-based+Intrusion+Classification+for+IEEE+802.11+Wireless+Networks&rft.au=Duan%2C+Qiang&rft.au=Wei%2C+Xianglin&rft.au=Fan%2C+Jianhua&rft.au=Yu%2C+Long&rft.date=2020-12-11&rft.pub=IEEE&rft.spage=830&rft.epage=833&rft_id=info:doi/10.1109%2FICCC51575.2020.9345293&rft.externalDocID=9345293 |