[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1102256.1102295acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
Article

802.11 network intrusion detection using genetic programming

Published: 25 June 2005 Publication History

Abstract

Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of features that the GP uses to train and test solutions which allow for the efficient and accurate detection of given attack patterns. However, when applied to a 802.11 network that is faced with attacks specific to the 802.11 protocol, the GP's detection rate reduces dramatically. In this work we discuss what causes this effect, and what can be done to improve the GP's performance on 802.11 networks.

References

[1]
AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices. AusCERT AA-2004.02, Australian Computer Emergency Response Team, http://www.auscert.org.au/render.html?it=4091, 13 May 2004.
[2]
IEEE-SA Standards Board. ANSI/IEEE Std 802.11, 1999 Edition (R2003). IEEE, New York, NY, USA, 1999.
[3]
J. Bellardo and S. Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In USENIX Security Symposium, pages 15--28, 2003.
[4]
R. Lfoeter. Wireless Lan Security Framework htttp://www.wlsec.net/void11/, 2002.
[5]
M. Lynn and R. Baird. Advanced 802.11 attack. Black hat Briefings, July 2002.
[6]
D. Song, R. Curry, M. I. Heywood, and A. N. Zincir-Heywood. On the efficient mining of network audit data using genetic programming. In GECCO 2004 Workshop Proceedings, Seattle, Washington, USA, 26--30 June 2004.
[7]
D. Song, M. I. Heywood, and A. N. Zincir-Heywood. A linear genetic programming approach to intrusion detection. In Genetic and Evolutionary Computation - GECCO-2003, volume 2724 of LNCS, pages 2325--2336, Chicago, 12--16 July 2003. Springer-Verlag.
[8]
S. T, L. Y.-X., and H. Owen. Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. In IEEE Wireless Communications and Networking Conference, Atlanta Ga., March 2004.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '05: Proceedings of the 7th annual workshop on Genetic and evolutionary computation
June 2005
431 pages
ISBN:9781450378000
DOI:10.1145/1102256
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 802.11
  2. WiFi
  3. denial of service
  4. genetic programming
  5. intrusion detection

Qualifiers

  • Article

Conference

GECCO05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Evolutionary Computation in Computer Security and Forensics: An OverviewComputational Intelligence for Privacy and Security10.1007/978-3-642-25237-2_3(25-34)Online publication date: 10-Jan-2012
  • (2010)honeyMProceedings of the third ACM conference on Wireless network security10.1145/1741866.1741888(129-138)Online publication date: 22-Mar-2010
  • (2010)ReviewApplied Soft Computing10.1016/j.asoc.2009.06.01910:1(1-35)Online publication date: 1-Jan-2010
  • (2008)Using randomized association ID to detect and prevent spoofed PS-Poll based denial of service attacks in IEEE 802.11 WLANsWSEAS TRANSACTIONS on COMMUNICATIONS10.5555/1455934.14559397:3(170-179)Online publication date: 1-Mar-2008
  • (2008)Beacon Frame Spoofing Attack Detection in IEEE 802.11 NetworksProceedings of the 2008 Third International Conference on Availability, Reliability and Security10.1109/ARES.2008.130(520-525)Online publication date: 4-Mar-2008
  • (2007)Defence against 802.11 dos attacks using artificial immune systemProceedings of the 6th international conference on Artificial immune systems10.5555/1776274.1776286(95-106)Online publication date: 26-Aug-2007
  • (2007)A solution to spoofed PS-poll based denial of service attacks in IEEE 802.11 WLANsProceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 1110.5555/1348101.1348103(7-11)Online publication date: 26-Jul-2007
  • (2007)Defence Against 802.11 DoS Attacks Using Artificial Immune SystemArtificial Immune Systems10.1007/978-3-540-73922-7_9(95-106)Online publication date: 2007
  • (2006)802.11 Disassociation DoS Attack and Its Solutions: A Survey2006 Proceedings of the First Mobile Computing and Wireless Communication International Conference10.1109/MCWC.2006.4375225(221-226)Online publication date: Sep-2006
  • (2006)Pseudo Randomized Sequence Number Based Solution to 802.11 Disassociation Denial of Service Attack2006 Proceedings of the First Mobile Computing and Wireless Communication International Conference10.1109/MCWC.2006.4375224(215-220)Online publication date: Sep-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media