Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 6, Issue 5

Abstract

A lthough of the widespread use of the WLANs, it is still vulnerable for the availability security issues. This research presents a proposal Wireless Network Intrusion Detection System (WNIDS) which is use misuse and anomaly techniques in intrusion detection. The proposal depend on Data mining is a DM-based WNIDS since mining provide iterative process so if results are not satisfied with optimal solution, the mining steps will continue to be carried out until mining results are corresponding intention results. For training and testing of WNIDS in our experiment, we used collected dataset called it W data set, the collection done on an organized WLAN 802.11 consist of 5 machines. The collection of data involved frames from all types (normal and the four known intrusions and unknown intrusion).The collected connections contain features those appear directly in the header of 802.11 frames and we added one more feature (casting) since it is critical in distinguish among intrusions. These connections are labelled as either normal or attack type, many of these features are irrelative in classification process. Here we propose Support Vector Machine SVM classifier as feature extraction to reduce no. of features to avoid time consuming in training and real-time detecting. SVM introduce 8 features as subset of correlated intrinsic features present the basic point in classification. The sets of features that have been resulted from SVM and the all features set will be the feeding of WNIDS. The results obtained from WNIDS showing that accuracy rate of ANN and ID3 classifiers are both higher with SVM (8) features than set of all features. And absolutely, ANN accuracy is higher than ID3 with both sets of features.

Authors and Affiliations

Jashuva. Chundi , V. V. Gopala Rao

Keywords

Related Articles

 Selective Embedding and Forbidden Zone Data Hiding for Strong Video Data Thrashing

 A new method for high capacity data hiding in H.264 streams takes advantage of the different block sizes used by the H.264 encoder during the inter prediction stage in order to hide the desirable data. This fragile...

 Power Reduction of FPGA by Guarded Evaluation Considering Logic Architecture in SOC Technology

 In this paper, guarded evaluation is a dynamic power reduction technique by identifying sub circuits inputs and kept constant at specific times during circuit operation. In certain condition, some signals within th...

Indoor Navigation on Google Maps and Indoor Localization Using RSS Fingerprinting

Contrasting to advances in street/outdoor navigation, wall mounted maps and signs continue to be the primary reference indoor navigation in hospitals, malls, museums, etc. The proliferation of mobile devices and the grow...

Optimum Size Selection For Spring Loaded Detachable Canister Launch Vehicle Interface For Multistage Long Range System

Canister-launch vehicle(LV) interface size is optimised using selective assembly method. Any over or under size of the interface is a mission critical. LV and canister are made of nos of sections and their respective pos...

 Performance Transaction’s Assessment Of Real Time Database System In Distributed Environment

 Database performance is a very important aspect of database usability. The objective of this paper is to proposed policy to forecast the performance of transaction under real time database system in distributed env...

Download PDF file
  • EP ID EP109948
  • DOI -
  • Views 139
  • Downloads 0

How To Cite

Jashuva. Chundi, V. V. Gopala Rao (2013). Role of Feature Reduction in Intrusion Detection Systems for Wireless Attacks. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 6(5), 241-246. https://europub.co.uk/articles/-A-109948