Intrusion Detection System Based on 802.11 Specific Attacks
Journal Title: International Journal of Computer Science and Communication Networks - Year 2011, Vol 1, Issue 2
Abstract
Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is central to ensuring the performance, speed of learning, accuracy, and reliability of these detectors as well as to remove noise from the set of features used to construct the classifiers. In most current systems, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11-specific attacks such as deauthentication attacks or MAC layer DoS attacks.
Authors and Affiliations
Dr. R. LAKSHMI TULASI , M. RAVIKANTH
A Comparative Analysis of Various Clustering Techniques used for Very Large Datasets
Data Mining is the process of extracting hidden knowledge, useful trends and pattern from large databases which is used in organization for decision-making purpose. There are various data mining techniques like clusterin...
E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm
This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self)....
Fuzzy Clustering as an Intrusion Detection Technique
Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...
Design and analysis of ZVZCS converter with active clamping
The design and analysis of ZVZCS converter with active clamping is proposed. By adding a secondary active clamp and controlling the clamp switch moderately, ZVS (for leading leg switches) and ZCS (for lagging leg switche...
Hardware/Software Co-design using Primitive Interface
Most engineering designs can be viewed as systems, i.e., as collections of several components whose combined operation provides useful services. Components can be heterogeneous in nature and their interaction may b...