Show simple item record

dc.contributor.authorRatnayake, Deepthi N.
dc.contributor.authorKazemian, Hassan B.
dc.contributor.authorYusuf, Syed A.
dc.contributor.authorAbdullah, Azween B.
dc.date.accessioned2022-08-18T15:15:01Z
dc.date.available2022-08-18T15:15:01Z
dc.date.issued2011-11-02
dc.identifier.citationRatnayake , D N , Kazemian , H B , Yusuf , S A & Abdullah , A B 2011 , An intelligent approach to detect probe request attacks in IEEE 802.11 networks . in Engineering Applications of Neural Networks - 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, AIAI 2011, Proceedings . PART 1 edn , IFIP Advances in Information and Communication Technology , no. PART 1 , vol. 363 AICT , Springer Nature , pp. 372-381 , 12th INNS EANN-SIG International Conference on Engineering Applications of Neural Networks, EANN 2011 , Corfu , Greece , 15/09/11 . https://doi.org/10.1007/978-3-642-23957-1_42
dc.identifier.citationconference
dc.identifier.isbn9783642239564
dc.identifier.issn1868-4238
dc.identifier.urihttp://hdl.handle.net/2299/25719
dc.description© 2011 International Federation for Information Processing. This is the accepted manuscript version of a conference paper which has been published in final form at https://doi.org/10.1007/978-3-642-23957-1_42
dc.description.abstractIn Wireless Local Area Networks (WLAN), beacon, probe request and response messages are unprotected, so the information is visible to sniffers. Probe requests can be sent by anyone with a legitimate Media Access Control (MAC) address, as association to the network is not required at this stage. Legitimate MAC addresses can be easily spoofed to bypass Access Point (AP) access lists. Attackers take advantage of these vulnerabilities and send a flood of probe request frames which can lead to a Denial-of-Service (DoS) to legitimate stations. This paper discusses an intelligent approach to recognise probe request attacks in WLANs. The research investigates and analyses WLAN traffic captured on a home wireless network, and uses supervised feedforward neural network with 4 input neurons, 2 hidden layers and an output neuron to determine the results. The computer simulation results demonstrate that this approach improves detection of MAC spoofing and probe request attacks considerably.en
dc.format.extent10
dc.format.extent868437
dc.language.isoeng
dc.publisherSpringer Nature
dc.relation.ispartofEngineering Applications of Neural Networks - 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, AIAI 2011, Proceedings
dc.relation.ispartofseriesIFIP Advances in Information and Communication Technology
dc.subjectDoS Attacks
dc.subjectIEEE 802.11
dc.subjectProbe Request Flooding Attacks
dc.subjectSupervised Feedforward Neural Network
dc.subjectWireless
dc.subjectInformation Systems
dc.subjectComputer Networks and Communications
dc.subjectInformation Systems and Management
dc.titleAn intelligent approach to detect probe request attacks in IEEE 802.11 networksen
dc.contributor.institutionDepartment of Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionAlgorithms
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=80055032476&partnerID=8YFLogxK
rioxxterms.versionofrecord10.1007/978-3-642-23957-1_42
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record