Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base

  title={Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base},
  author={Douglas W. F. L. Vilela and Anna Diva P. Lotufo and Carlos R. Santos-Junior},
  journal={2018 International Joint Conference on Neural Networks (IJCNN)},
In the latest years, the network computers and computational systems are receiving several cyber-attacks that affect its security. [...] Key Method The methodology shows the implementation of Fuzzy ARTMAP neural network as IDS. The obtained results are promising and attest that the proposed classifier is feasible for this IDS application.Expand
Detection of Malicious SCADA Communications via Multi-Subspace Feature Selection
A novel feature selection approach, called MSFS, to tackle undesirable quality of data caused by feature redundancy is proposed, which extensively improves the detection performance in terms of classification accuracy and standard deviation.
802.11 Frame-level Network IDS for Public Wireless Networks


Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks
A technique is proposed that combines a fuzzy ARTMAP neural network with the well-known Kappa coefficient to perform feature selection and is capable of detecting intrusions with high accuracy rates while keeping the computational cost low.
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network
  • Bayu Adhi Tama, K. Rhee
  • Computer Science
    2016 11th Asia Joint Conference on Information Security (AsiaJCIS)
  • 2016
From the experimental result and classifier significant test, it can be revealed that the performance of Rotation Forest has brought significant improvement over the base classifiers.
Intrusion detection by machine learning: A review
This chapter reviews 55 related studies in the period between 2000 and 2007 focusing on developing single, hybrid, and ensemble classifiers and discusses current achievements and limitations in developing intrusion detection systems by machine learning.
The use of computational intelligence in intrusion detection systems: A review
An overview of the research progress in applying CI methods to the problem of intrusion detection is provided, including core methods of CI, including artificial neural networks, fuzzy systems, evolutionary computation, artificial immune systems, swarm intelligence, and soft computing.
A Wireless Intrusion Detection System for 802.11 networks
A pragmatic study of two common attacks on the IEEE 802.11 standard is conducted, and novel attack signatures and techniques to detect these attacks are devised and implemented in a proof of concept Wireless Intrusion Detection System (WIDS).
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
  • T. Sobh
  • Computer Science
    Comput. Stand. Interfaces
  • 2006
A structural approach to the IDS is presented by introducing a classification of IDS and important features, advantages and disadvantages of each detection approach and the corresponding detection techniques are presented.
Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
  • K. El-Khatib
  • Computer Science
    IEEE Transactions on Parallel and Distributed Systems
  • 2010
A novel hybrid model that efficiently selects the optimal set of features in order to detect 802.11-specific intrusions is proposed and the impact of the optimization of the feature set for wireless intrusion detection systems on the performance and learning time of different types of classifiers based on neural networks is studied.
Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset
This work gathers, categorizes, thoroughly evaluates, and offers a publicly available dataset containing a rich blend of normal and attack traffic against 802.11 networks, anticipated to offer a solid basis for intrusion detection in the current as well as next-generation wireless networks.
Short paper: security evaluation of IEEE 802.11w specification
This paper scrutinizes the resilience of 802.11w amendment against known disconnection based DoS attacks and reveals that new attributes introduced in this amendment can be misused to cause serious disruption in wireless networks.
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
A systematic survey of DoS attacks, which exploits MAC and physical layer vulnerabilities of 802.11 networks, is presented and available countermeasures against DoS attacked are discussed and compared.