Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 6, Issue 5
Abstract
A lthough of the widespread use of the WLANs, it is still vulnerable for the availability security issues. This research presents a proposal Wireless Network Intrusion Detection System (WNIDS) which is use misuse and anomaly techniques in intrusion detection. The proposal depend on Data mining is a DM-based WNIDS since mining provide iterative process so if results are not satisfied with optimal solution, the mining steps will continue to be carried out until mining results are corresponding intention results. For training and testing of WNIDS in our experiment, we used collected dataset called it W data set, the collection done on an organized WLAN 802.11 consist of 5 machines. The collection of data involved frames from all types (normal and the four known intrusions and unknown intrusion).The collected connections contain features those appear directly in the header of 802.11 frames and we added one more feature (casting) since it is critical in distinguish among intrusions. These connections are labelled as either normal or attack type, many of these features are irrelative in classification process. Here we propose Support Vector Machine SVM classifier as feature extraction to reduce no. of features to avoid time consuming in training and real-time detecting. SVM introduce 8 features as subset of correlated intrinsic features present the basic point in classification. The sets of features that have been resulted from SVM and the all features set will be the feeding of WNIDS. The results obtained from WNIDS showing that accuracy rate of ANN and ID3 classifiers are both higher with SVM (8) features than set of all features. And absolutely, ANN accuracy is higher than ID3 with both sets of features.
Authors and Affiliations
Jashuva. Chundi , V. V. Gopala Rao
Detection of Node Clones in Wireless Sensor Network Using Detection Protocols
Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone...
A Novel Hybrid CQI Feedback Method For Throughput Improvement In 3GPP LTE Systems
Frequency Selective Scheduling (FSS) is a prominent characteristic in 3GPP LTE systems. Frequency scheduling depends on Channel Quality Indicator(CQI) feedback report by mobile station. CQI being control information must...
Feature Extraction of ECG Signal Using HHT Algorithm
This paper describe the features extraction algorithm for electrocardiogram (ECG) signal using Huang Hilbert Transform and Wavelet Transform. ECG signal for an individual human being is different due to unique heart stru...
Finite Element Analysis of Pressure Vessel and Piping Design
The main objective of this paper is finite element analysis of pressure vessel and piping design. Features of multilayered high pressure vessels, their advantages over mono block vessel are discussed. Various param...
Performance Evaluation of Modified LSB Digital Image Watermarking Technique
Digital Image Watermarking is the process of embedding information/logo into a digital image which may be used to verify its authenticity or the identity of its owners. If the watermarked image is copied, then the inform...