Intrusion detection system based on 802.11 specific attacks

The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting attacks such as deauthentication attacks or MAC layer DoS attacks. | ISSN:2249-5789 Dr. R Lakshmi Tulasi et al, International Journal of Computer Science & Communication Networks,Vol 1(2), 165-170 INTRUSION DETECTION SYSTEM BASED ON SPECIFIC ATTACKS Dr. R. LAKSHMI TULASI HOD Of CSE Department, QIS College of Engineering & Technology, Ongole, PrakasamDt., . e-mail: (09491D5812 – ) QIS College of Engineering & Technology, Ongole, PrakasamDt., . e-mail: ravi_kanth_m@ Abstract—Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is central to ensuring the performance, speed of learning, accuracy, and reliability of these detectors as well as to remove noise from the set of features used to construct the classifiers. In most current systems, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting attacks such as deauthentication attacks or MAC layer DoS attacks. Key Wor ds—Feature selection, intrusion detection systems, K-means, information gain ratio, wireless networks, neural networks. 1 INTRODUCTION INTRUSIONS are the result of flaws in the design and implementation of computer systems, operating systems, applications, and communication protocols. Statistics [21] show that the number of identified vulnerabilities is growing. Exploitation of these vulnerabilities is becoming easier because the knowledge and tools to launch attacks are readily available and usable. It has become easy .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
476    17    1    27-11-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.