dc.contributor.author | Ratnayake, Deepthi N. | |
dc.contributor.author | Kazemian, Hassan B. | |
dc.contributor.author | Yusuf, Syed A. | |
dc.contributor.author | Abdullah, Azween B. | |
dc.date.accessioned | 2022-08-18T15:15:01Z | |
dc.date.available | 2022-08-18T15:15:01Z | |
dc.date.issued | 2011-11-02 | |
dc.identifier.citation | Ratnayake , D N , Kazemian , H B , Yusuf , S A & Abdullah , A B 2011 , An intelligent approach to detect probe request attacks in IEEE 802.11 networks . in Engineering Applications of Neural Networks - 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, AIAI 2011, Proceedings . PART 1 edn , IFIP Advances in Information and Communication Technology , no. PART 1 , vol. 363 AICT , Springer Nature , pp. 372-381 , 12th INNS EANN-SIG International Conference on Engineering Applications of Neural Networks, EANN 2011 , Corfu , Greece , 15/09/11 . https://doi.org/10.1007/978-3-642-23957-1_42 | |
dc.identifier.citation | conference | |
dc.identifier.isbn | 9783642239564 | |
dc.identifier.issn | 1868-4238 | |
dc.identifier.uri | http://hdl.handle.net/2299/25719 | |
dc.description | © 2011 International Federation for Information Processing. This is the accepted manuscript version of a conference paper which has been published in final form at https://doi.org/10.1007/978-3-642-23957-1_42 | |
dc.description.abstract | In Wireless Local Area Networks (WLAN), beacon, probe request and response messages are unprotected, so the information is visible to sniffers. Probe requests can be sent by anyone with a legitimate Media Access Control (MAC) address, as association to the network is not required at this stage. Legitimate MAC addresses can be easily spoofed to bypass Access Point (AP) access lists. Attackers take advantage of these vulnerabilities and send a flood of probe request frames which can lead to a Denial-of-Service (DoS) to legitimate stations. This paper discusses an intelligent approach to recognise probe request attacks in WLANs. The research investigates and analyses WLAN traffic captured on a home wireless network, and uses supervised feedforward neural network with 4 input neurons, 2 hidden layers and an output neuron to determine the results. The computer simulation results demonstrate that this approach improves detection of MAC spoofing and probe request attacks considerably. | en |
dc.format.extent | 10 | |
dc.format.extent | 868437 | |
dc.language.iso | eng | |
dc.publisher | Springer Nature | |
dc.relation.ispartof | Engineering Applications of Neural Networks - 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, AIAI 2011, Proceedings | |
dc.relation.ispartofseries | IFIP Advances in Information and Communication Technology | |
dc.subject | DoS Attacks | |
dc.subject | IEEE 802.11 | |
dc.subject | Probe Request Flooding Attacks | |
dc.subject | Supervised Feedforward Neural Network | |
dc.subject | Wireless | |
dc.subject | Information Systems | |
dc.subject | Computer Networks and Communications | |
dc.subject | Information Systems and Management | |
dc.title | An intelligent approach to detect probe request attacks in IEEE 802.11 networks | en |
dc.contributor.institution | Department of Computer Science | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.contributor.institution | Algorithms | |
dc.identifier.url | http://www.scopus.com/inward/record.url?scp=80055032476&partnerID=8YFLogxK | |
rioxxterms.versionofrecord | 10.1007/978-3-642-23957-1_42 | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |