Intrusion Detection System Based on 802.11 Specific Attacks

Abstract

Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is central to ensuring the performance, speed of learning, accuracy, and reliability of these detectors as well as to remove noise from the set of features used to construct the classifiers. In most current systems, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11-specific attacks such as deauthentication attacks or MAC layer DoS attacks.

Authors and Affiliations

Dr. R. LAKSHMI TULASI , M. RAVIKANTH

Keywords

Related Articles

A Comparative Analysis of Various Clustering Techniques used for Very Large Datasets

Data Mining is the process of extracting hidden knowledge, useful trends and pattern from large databases which is used in organization for decision-making purpose. There are various data mining techniques like clusterin...

E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm

 This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self)....

Fuzzy Clustering as an Intrusion Detection Technique

Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of att...

Design and analysis of ZVZCS converter with active clamping

The design and analysis of ZVZCS converter with active clamping is proposed. By adding a secondary active clamp and controlling the clamp switch moderately, ZVS (for leading leg switches) and ZCS (for lagging leg switche...

Hardware/Software Co-design using Primitive Interface

 Most engineering designs can be viewed as systems, i.e., as collections of several components whose combined operation provides useful services. Components can be heterogeneous in nature and their interaction may b...

Download PDF file
  • EP ID EP155596
  • DOI -
  • Views 157
  • Downloads 0

How To Cite

Dr. R. LAKSHMI TULASI, M. RAVIKANTH (2011). Intrusion Detection System Based on 802.11 Specific Attacks. International Journal of Computer Science and Communication Networks, 1(2), 165-170. https://europub.co.uk/articles/-A-155596